mirror of
https://github.com/rclone/rclone.git
synced 2024-12-02 21:37:31 +01:00
a4f1f3d4e8
This fixes a regression in the rclone tests from the v1.0.6 upgrade of uplink. The failure was due to an improperly converted error resulting in the wrong type of error.
155 lines
4.4 KiB
Go
155 lines
4.4 KiB
Go
// Copyright (C) 2020 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package uplink
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/zeebo/errs"
|
|
"go.uber.org/zap"
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"storj.io/common/encryption"
|
|
"storj.io/common/memory"
|
|
"storj.io/common/rpc"
|
|
"storj.io/common/storj"
|
|
"storj.io/uplink/internal/telemetryclient"
|
|
"storj.io/uplink/private/ecclient"
|
|
"storj.io/uplink/private/metainfo"
|
|
"storj.io/uplink/private/metainfo/kvmetainfo"
|
|
"storj.io/uplink/private/storage/segments"
|
|
"storj.io/uplink/private/storage/streams"
|
|
"storj.io/uplink/private/testuplink"
|
|
)
|
|
|
|
// maxSegmentSize can be used to override max segment size with ldflags build parameter.
|
|
// Example: go build -ldflags "-X 'storj.io/uplink.maxSegmentSize=1MiB'" storj.io/storj/cmd/uplink.
|
|
var maxSegmentSize string
|
|
|
|
// Project provides access to managing buckets and objects.
|
|
type Project struct {
|
|
config Config
|
|
access *Access
|
|
dialer rpc.Dialer
|
|
metainfo *metainfo.Client
|
|
project *kvmetainfo.Project
|
|
db *kvmetainfo.DB
|
|
streams streams.Store
|
|
|
|
eg *errgroup.Group
|
|
telemetry telemetryclient.Client
|
|
}
|
|
|
|
// OpenProject opens a project with the specific access grant.
|
|
func OpenProject(ctx context.Context, access *Access) (*Project, error) {
|
|
return (Config{}).OpenProject(ctx, access)
|
|
}
|
|
|
|
// OpenProject opens a project with the specific access grant.
|
|
func (config Config) OpenProject(ctx context.Context, access *Access) (project *Project, err error) {
|
|
defer mon.Func().RestartTrace(&ctx)(&err)
|
|
|
|
if access == nil {
|
|
return nil, packageError.New("access grant is nil")
|
|
}
|
|
|
|
var telemetry telemetryclient.Client
|
|
if ctor, ok := telemetryclient.ConstructorFrom(ctx); ok {
|
|
telemetry, err = ctor(zap.L(), access.satelliteAddress)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
telemetry.Stop()
|
|
}
|
|
}()
|
|
}
|
|
|
|
metainfo, dialer, _, err := config.dial(ctx, access.satelliteAddress, access.apiKey)
|
|
if err != nil {
|
|
return nil, packageError.Wrap(err)
|
|
}
|
|
|
|
// TODO: All these should be controlled by the satellite and not configured by the uplink.
|
|
// For now we need to have these hard coded values that match the satellite configuration
|
|
// to be able to create the underlying ecclient, segement store and stream store.
|
|
var (
|
|
segmentsSize = 64 * memory.MiB.Int64()
|
|
maxInlineSize = 4 * memory.KiB.Int()
|
|
)
|
|
|
|
if maxSegmentSize != "" {
|
|
segmentsSize, err = memory.ParseString(maxSegmentSize)
|
|
if err != nil {
|
|
return nil, packageError.Wrap(err)
|
|
}
|
|
} else {
|
|
s, ok := testuplink.GetMaxSegmentSize(ctx)
|
|
if ok {
|
|
segmentsSize = s.Int64()
|
|
}
|
|
}
|
|
|
|
// TODO: This should come from the EncryptionAccess. For now it's hardcoded to twice the
|
|
// stripe size of the default redundancy scheme on the satellite.
|
|
encBlockSize := 29 * 256 * memory.B.Int32()
|
|
|
|
// TODO: What is the correct way to derive a named zap.Logger from config.Log?
|
|
ec := ecclient.NewClient(zap.L().Named("ecclient"), dialer, 0)
|
|
segmentStore := segments.NewSegmentStore(metainfo, ec)
|
|
|
|
encryptionParameters := storj.EncryptionParameters{
|
|
// TODO: the cipher should be provided by the Access, but we don't store it there yet.
|
|
CipherSuite: storj.EncAESGCM,
|
|
BlockSize: encBlockSize,
|
|
}
|
|
|
|
maxEncryptedSegmentSize, err := encryption.CalcEncryptedSize(segmentsSize, encryptionParameters)
|
|
if err != nil {
|
|
return nil, packageError.Wrap(err)
|
|
}
|
|
|
|
streamStore, err := streams.NewStreamStore(metainfo, segmentStore, segmentsSize, access.encAccess.Store(), int(encryptionParameters.BlockSize), encryptionParameters.CipherSuite, maxInlineSize, maxEncryptedSegmentSize)
|
|
if err != nil {
|
|
return nil, packageError.Wrap(err)
|
|
}
|
|
|
|
proj := kvmetainfo.NewProject(streamStore, encBlockSize, segmentsSize, *metainfo)
|
|
db := kvmetainfo.New(proj, metainfo, streamStore, segmentStore, access.encAccess.Store())
|
|
|
|
var eg errgroup.Group
|
|
if telemetry != nil {
|
|
eg.Go(func() error {
|
|
telemetry.Run(ctx)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
return &Project{
|
|
config: config,
|
|
access: access,
|
|
dialer: dialer,
|
|
metainfo: metainfo,
|
|
project: proj,
|
|
db: db,
|
|
streams: streamStore,
|
|
eg: &eg,
|
|
telemetry: telemetry,
|
|
}, nil
|
|
}
|
|
|
|
// Close closes the project and all associated resources.
|
|
func (project *Project) Close() (err error) {
|
|
if project.telemetry != nil {
|
|
project.telemetry.Stop()
|
|
err = errs.Combine(
|
|
project.eg.Wait(),
|
|
project.telemetry.Report(context.Background()),
|
|
)
|
|
}
|
|
return packageError.Wrap(errs.Combine(err, project.metainfo.Close()))
|
|
}
|