2020-07-06 09:18:16 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
2023-02-03 10:00:18 +00:00
|
|
|
"path"
|
2022-07-13 12:27:05 +00:00
|
|
|
"runtime"
|
2020-10-19 08:47:13 +00:00
|
|
|
"sort"
|
2020-07-06 09:18:16 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2023-03-07 14:38:08 +00:00
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/resolver"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/version"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/pool"
|
2020-07-06 09:18:16 +00:00
|
|
|
"github.com/spf13/pflag"
|
|
|
|
"github.com/spf13/viper"
|
|
|
|
"go.uber.org/zap"
|
2022-09-12 09:45:54 +00:00
|
|
|
"go.uber.org/zap/zapcore"
|
2020-07-06 09:18:16 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2022-07-18 13:11:25 +00:00
|
|
|
defaultRebalanceInterval = 60 * time.Second
|
2022-04-14 15:09:57 +00:00
|
|
|
defaultHealthcheckTimeout = 15 * time.Second
|
2022-07-18 13:11:25 +00:00
|
|
|
defaultConnectTimeout = 10 * time.Second
|
2022-11-15 14:19:21 +00:00
|
|
|
defaultStreamTimeout = 10 * time.Second
|
2022-04-14 15:09:57 +00:00
|
|
|
defaultShutdownTimeout = 15 * time.Second
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2022-07-29 06:26:11 +00:00
|
|
|
defaultPoolErrorThreshold uint32 = 100
|
|
|
|
|
2020-07-22 13:02:32 +00:00
|
|
|
defaultMaxClientsCount = 100
|
|
|
|
defaultMaxClientsDeadline = time.Second * 30
|
2020-07-06 09:18:16 +00:00
|
|
|
)
|
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
const ( // Settings.
|
|
|
|
// Logger.
|
2022-03-22 10:22:00 +00:00
|
|
|
cfgLoggerLevel = "logger.level"
|
2020-07-07 11:25:13 +00:00
|
|
|
|
2021-06-22 13:25:29 +00:00
|
|
|
// Wallet.
|
2022-07-28 13:26:42 +00:00
|
|
|
cfgWalletPath = "wallet.path"
|
|
|
|
cfgWalletAddress = "wallet.address"
|
2021-06-22 13:25:29 +00:00
|
|
|
cfgWalletPassphrase = "wallet.passphrase"
|
2022-07-28 13:26:42 +00:00
|
|
|
cmdWallet = "wallet"
|
|
|
|
cmdAddress = "address"
|
2020-07-15 20:16:27 +00:00
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
// Server.
|
|
|
|
cfgServer = "server"
|
|
|
|
cfgTLSEnabled = "tls.enabled"
|
2020-07-13 15:50:11 +00:00
|
|
|
cfgTLSKeyFile = "tls.key_file"
|
|
|
|
cfgTLSCertFile = "tls.cert_file"
|
|
|
|
|
2022-07-29 06:26:11 +00:00
|
|
|
// Pool config.
|
2022-04-14 15:09:57 +00:00
|
|
|
cfgConnectTimeout = "connect_timeout"
|
2022-11-15 14:19:21 +00:00
|
|
|
cfgStreamTimeout = "stream_timeout"
|
2022-04-14 15:09:57 +00:00
|
|
|
cfgHealthcheckTimeout = "healthcheck_timeout"
|
|
|
|
cfgRebalanceInterval = "rebalance_interval"
|
2022-07-29 06:26:11 +00:00
|
|
|
cfgPoolErrorThreshold = "pool_error_threshold"
|
2020-07-07 11:25:13 +00:00
|
|
|
|
2021-08-16 09:58:09 +00:00
|
|
|
// Caching.
|
2022-10-03 14:33:49 +00:00
|
|
|
cfgObjectsCacheLifetime = "cache.objects.lifetime"
|
|
|
|
cfgObjectsCacheSize = "cache.objects.size"
|
|
|
|
cfgListObjectsCacheLifetime = "cache.list.lifetime"
|
|
|
|
cfgListObjectsCacheSize = "cache.list.size"
|
|
|
|
cfgBucketsCacheLifetime = "cache.buckets.lifetime"
|
|
|
|
cfgBucketsCacheSize = "cache.buckets.size"
|
|
|
|
cfgNamesCacheLifetime = "cache.names.lifetime"
|
|
|
|
cfgNamesCacheSize = "cache.names.size"
|
|
|
|
cfgSystemCacheLifetime = "cache.system.lifetime"
|
|
|
|
cfgSystemCacheSize = "cache.system.size"
|
|
|
|
cfgAccessBoxCacheLifetime = "cache.accessbox.lifetime"
|
|
|
|
cfgAccessBoxCacheSize = "cache.accessbox.size"
|
|
|
|
cfgAccessControlCacheLifetime = "cache.accesscontrol.lifetime"
|
|
|
|
cfgAccessControlCacheSize = "cache.accesscontrol.size"
|
2021-08-16 09:58:09 +00:00
|
|
|
|
2022-02-04 10:05:36 +00:00
|
|
|
// NATS.
|
|
|
|
cfgEnableNATS = "nats.enabled"
|
|
|
|
cfgNATSEndpoint = "nats.endpoint"
|
|
|
|
cfgNATSTimeout = "nats.timeout"
|
|
|
|
cfgNATSTLSCertFile = "nats.cert_file"
|
|
|
|
cfgNATSAuthPrivateKeyFile = "nats.key_file"
|
|
|
|
cfgNATSRootCAFiles = "nats.root_ca"
|
|
|
|
|
2021-08-23 18:39:15 +00:00
|
|
|
// Policy.
|
2022-11-03 06:34:18 +00:00
|
|
|
cfgPolicyDefault = "placement_policy.default"
|
|
|
|
cfgPolicyRegionMapFile = "placement_policy.region_mapping"
|
2023-04-24 23:49:12 +00:00
|
|
|
cfgCopiesNumbers = "placement_policy.copies_numbers"
|
2021-08-23 18:39:15 +00:00
|
|
|
|
2021-10-04 14:32:35 +00:00
|
|
|
// CORS.
|
|
|
|
cfgDefaultMaxAge = "cors.default_max_age"
|
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
// MaxClients.
|
2020-07-22 13:02:32 +00:00
|
|
|
cfgMaxClientsCount = "max_clients_count"
|
|
|
|
cfgMaxClientsDeadline = "max_clients_deadline"
|
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
// Metrics / Profiler / Web.
|
2022-07-26 13:29:07 +00:00
|
|
|
cfgPrometheusEnabled = "prometheus.enabled"
|
|
|
|
cfgPrometheusAddress = "prometheus.address"
|
|
|
|
cfgPProfEnabled = "pprof.enabled"
|
|
|
|
cfgPProfAddress = "pprof.address"
|
|
|
|
|
|
|
|
cfgListenDomains = "listen_domains"
|
2020-07-07 11:25:13 +00:00
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
// Peers.
|
2020-10-19 08:47:13 +00:00
|
|
|
cfgPeers = "peers"
|
|
|
|
|
2022-04-22 07:18:21 +00:00
|
|
|
cfgTreeServiceEndpoint = "tree.service"
|
|
|
|
|
2022-01-11 10:09:34 +00:00
|
|
|
// NeoGo.
|
2022-04-14 18:10:57 +00:00
|
|
|
cfgRPCEndpoint = "rpc_endpoint"
|
2022-01-11 10:09:34 +00:00
|
|
|
|
|
|
|
// Resolving.
|
2022-04-14 18:10:57 +00:00
|
|
|
cfgResolveOrder = "resolve_order"
|
2022-01-11 10:09:34 +00:00
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
// Application.
|
2020-07-07 11:25:13 +00:00
|
|
|
cfgApplicationBuildTime = "app.build_time"
|
2020-10-19 08:47:13 +00:00
|
|
|
|
2023-03-02 14:54:33 +00:00
|
|
|
// Kludge.
|
|
|
|
cfgKludgeUseDefaultXMLNSForCompleteMultipartUpload = "kludge.use_default_xmlns_for_complete_multipart"
|
2023-03-20 08:44:35 +00:00
|
|
|
cfgKludgeCompleteMultipartUploadKeepalive = "kludge.complete_multipart_keepalive"
|
2023-03-02 14:54:33 +00:00
|
|
|
|
2021-05-13 19:25:32 +00:00
|
|
|
// Command line args.
|
2023-02-03 10:00:18 +00:00
|
|
|
cmdHelp = "help"
|
|
|
|
cmdVersion = "version"
|
|
|
|
cmdConfig = "config"
|
|
|
|
cmdConfigDir = "config-dir"
|
|
|
|
cmdPProf = "pprof"
|
|
|
|
cmdMetrics = "metrics"
|
2021-05-20 12:41:32 +00:00
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
cmdListenAddress = "listen_address"
|
|
|
|
|
2022-12-20 08:38:58 +00:00
|
|
|
// Configuration of parameters of requests to FrostFS.
|
|
|
|
// Number of the object copies to consider PUT to FrostFS successful.
|
|
|
|
cfgSetCopiesNumber = "frostfs.set_copies_number"
|
2022-08-11 22:48:56 +00:00
|
|
|
|
2022-08-31 22:43:36 +00:00
|
|
|
// List of allowed AccessKeyID prefixes.
|
|
|
|
cfgAllowedAccessKeyIDPrefixes = "allowed_access_key_id_prefixes"
|
|
|
|
|
2023-02-10 12:19:29 +00:00
|
|
|
// Bucket resolving options.
|
|
|
|
cfgResolveBucketAllow = "resolve_bucket.allow"
|
|
|
|
cfgResolveBucketDeny = "resolve_bucket.deny"
|
|
|
|
|
2022-04-13 16:56:58 +00:00
|
|
|
// envPrefix is an environment variables prefix used for configuration.
|
2021-05-20 12:41:32 +00:00
|
|
|
envPrefix = "S3_GW"
|
2020-07-07 11:25:13 +00:00
|
|
|
)
|
|
|
|
|
2020-10-19 08:47:13 +00:00
|
|
|
var ignore = map[string]struct{}{
|
|
|
|
cfgApplicationBuildTime: {},
|
|
|
|
|
|
|
|
cfgPeers: {},
|
|
|
|
|
|
|
|
cmdHelp: {},
|
|
|
|
cmdVersion: {},
|
|
|
|
}
|
|
|
|
|
2023-05-18 13:20:00 +00:00
|
|
|
func fetchDefaultCopiesNumbers(v *viper.Viper) ([]uint32, error) {
|
2023-05-16 14:24:10 +00:00
|
|
|
unparsed := v.GetStringSlice(cfgSetCopiesNumber)
|
|
|
|
var result []uint32
|
|
|
|
|
|
|
|
for i := range unparsed {
|
|
|
|
parsedValue, err := strconv.ParseUint(unparsed[i], 10, 32)
|
|
|
|
if err != nil {
|
2023-05-18 13:20:00 +00:00
|
|
|
return nil, err
|
2023-05-16 14:24:10 +00:00
|
|
|
}
|
|
|
|
result = append(result, uint32(parsedValue))
|
|
|
|
}
|
|
|
|
|
2023-05-18 13:20:00 +00:00
|
|
|
return result, nil
|
2023-05-16 14:24:10 +00:00
|
|
|
}
|
|
|
|
|
2023-05-18 13:20:00 +00:00
|
|
|
func fetchCopiesNumbers(l *zap.Logger, v *viper.Viper) (map[string][]uint32, error) {
|
2023-04-24 23:49:12 +00:00
|
|
|
var copiesNums = make(map[string][]uint32)
|
|
|
|
for i := 0; ; i++ {
|
|
|
|
key := cfgCopiesNumbers + "." + strconv.Itoa(i) + "."
|
|
|
|
constraint := v.GetString(key + "location_constraint")
|
|
|
|
vector := v.GetStringSlice(key + "vector")
|
|
|
|
|
2023-05-16 14:24:10 +00:00
|
|
|
if constraint == "" || len(vector) == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
2023-04-24 23:49:12 +00:00
|
|
|
vector32 := make([]uint32, len(vector))
|
|
|
|
for j := range vector {
|
|
|
|
parsedValue, err := strconv.ParseUint(vector[j], 10, 32)
|
|
|
|
if err != nil {
|
2023-05-18 13:20:00 +00:00
|
|
|
return nil, err
|
2023-04-24 23:49:12 +00:00
|
|
|
}
|
|
|
|
vector32[j] = uint32(parsedValue)
|
|
|
|
}
|
|
|
|
|
|
|
|
copiesNums[constraint] = vector32
|
2023-05-18 13:20:00 +00:00
|
|
|
l.Info("constraint added", zap.String("location", constraint), zap.Strings("copies numbers", vector))
|
2023-04-24 23:49:12 +00:00
|
|
|
}
|
2023-05-18 13:20:00 +00:00
|
|
|
return copiesNums, nil
|
2023-04-24 23:49:12 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 14:36:44 +00:00
|
|
|
func fetchPeers(l *zap.Logger, v *viper.Viper) []pool.NodeParam {
|
|
|
|
var nodes []pool.NodeParam
|
2020-07-07 11:25:13 +00:00
|
|
|
for i := 0; ; i++ {
|
2020-10-19 08:47:13 +00:00
|
|
|
key := cfgPeers + "." + strconv.Itoa(i) + "."
|
2020-07-07 11:25:13 +00:00
|
|
|
address := v.GetString(key + "address")
|
|
|
|
weight := v.GetFloat64(key + "weight")
|
2021-12-29 13:38:23 +00:00
|
|
|
priority := v.GetInt(key + "priority")
|
2020-07-07 11:25:13 +00:00
|
|
|
|
|
|
|
if address == "" {
|
|
|
|
l.Warn("skip, empty address")
|
|
|
|
break
|
|
|
|
}
|
2021-05-26 16:48:27 +00:00
|
|
|
if weight <= 0 { // unspecified or wrong
|
|
|
|
weight = 1
|
|
|
|
}
|
2021-12-29 13:38:23 +00:00
|
|
|
if priority <= 0 { // unspecified or wrong
|
|
|
|
priority = 1
|
|
|
|
}
|
|
|
|
|
2022-04-07 14:36:44 +00:00
|
|
|
nodes = append(nodes, pool.NewNodeParam(priority, address, weight))
|
2020-07-07 11:25:13 +00:00
|
|
|
|
2021-05-26 16:48:27 +00:00
|
|
|
l.Info("added connection peer",
|
2020-11-24 07:09:58 +00:00
|
|
|
zap.String("address", address),
|
|
|
|
zap.Float64("weight", weight))
|
2020-07-07 11:25:13 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 14:36:44 +00:00
|
|
|
return nodes
|
2020-07-07 11:25:13 +00:00
|
|
|
}
|
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
func fetchServers(v *viper.Viper) []ServerInfo {
|
|
|
|
var servers []ServerInfo
|
|
|
|
|
|
|
|
for i := 0; ; i++ {
|
|
|
|
key := cfgServer + "." + strconv.Itoa(i) + "."
|
|
|
|
|
|
|
|
var serverInfo ServerInfo
|
|
|
|
serverInfo.Address = v.GetString(key + "address")
|
|
|
|
serverInfo.TLS.Enabled = v.GetBool(key + cfgTLSEnabled)
|
|
|
|
serverInfo.TLS.KeyFile = v.GetString(key + cfgTLSKeyFile)
|
|
|
|
serverInfo.TLS.CertFile = v.GetString(key + cfgTLSCertFile)
|
|
|
|
|
|
|
|
if serverInfo.Address == "" {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
servers = append(servers, serverInfo)
|
|
|
|
}
|
|
|
|
|
|
|
|
return servers
|
|
|
|
}
|
|
|
|
|
2020-07-06 09:18:16 +00:00
|
|
|
func newSettings() *viper.Viper {
|
|
|
|
v := viper.New()
|
|
|
|
|
|
|
|
v.AutomaticEnv()
|
2021-05-20 12:41:32 +00:00
|
|
|
v.SetEnvPrefix(envPrefix)
|
2020-07-06 09:18:16 +00:00
|
|
|
v.SetConfigType("yaml")
|
|
|
|
v.SetEnvKeyReplacer(strings.NewReplacer(".", "_"))
|
2021-06-24 15:21:34 +00:00
|
|
|
v.AllowEmptyEnv(true)
|
2020-07-06 09:18:16 +00:00
|
|
|
|
|
|
|
// flags setup:
|
|
|
|
flags := pflag.NewFlagSet("commandline", pflag.ExitOnError)
|
2020-12-02 09:46:51 +00:00
|
|
|
flags.SetOutput(os.Stdout)
|
2020-07-06 09:18:16 +00:00
|
|
|
flags.SortFlags = false
|
|
|
|
|
2022-07-26 13:29:07 +00:00
|
|
|
flags.Bool(cmdPProf, false, "enable pprof")
|
|
|
|
flags.Bool(cmdMetrics, false, "enable prometheus metrics")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2020-10-19 08:47:13 +00:00
|
|
|
help := flags.BoolP(cmdHelp, "h", false, "show help")
|
2021-05-20 12:41:32 +00:00
|
|
|
versionFlag := flags.BoolP(cmdVersion, "v", false, "show version")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2022-07-28 13:26:42 +00:00
|
|
|
flags.StringP(cmdWallet, "w", "", `path to the wallet`)
|
|
|
|
flags.String(cmdAddress, "", `address of wallet account`)
|
2023-02-03 10:00:18 +00:00
|
|
|
flags.StringArray(cmdConfig, nil, "config paths")
|
|
|
|
flags.String(cmdConfigDir, "", "config dir path")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2022-04-14 15:09:57 +00:00
|
|
|
flags.Duration(cfgHealthcheckTimeout, defaultHealthcheckTimeout, "set timeout to check node health during rebalance")
|
2022-12-20 08:38:58 +00:00
|
|
|
flags.Duration(cfgConnectTimeout, defaultConnectTimeout, "set timeout to connect to FrostFS nodes")
|
2022-04-14 15:09:57 +00:00
|
|
|
flags.Duration(cfgRebalanceInterval, defaultRebalanceInterval, "set rebalance interval")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2020-07-22 13:02:32 +00:00
|
|
|
flags.Int(cfgMaxClientsCount, defaultMaxClientsCount, "set max-clients count")
|
|
|
|
flags.Duration(cfgMaxClientsDeadline, defaultMaxClientsDeadline, "set max-clients deadline")
|
|
|
|
|
2022-11-09 11:53:26 +00:00
|
|
|
flags.String(cmdListenAddress, "0.0.0.0:8080", "set the main address to listen")
|
2021-06-10 12:26:57 +00:00
|
|
|
flags.String(cfgTLSCertFile, "", "TLS certificate file to use")
|
|
|
|
flags.String(cfgTLSKeyFile, "", "TLS key file to use")
|
|
|
|
|
2022-12-20 08:38:58 +00:00
|
|
|
peers := flags.StringArrayP(cfgPeers, "p", nil, "set FrostFS nodes")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2022-01-11 10:09:34 +00:00
|
|
|
flags.StringP(cfgRPCEndpoint, "r", "", "set RPC endpoint")
|
|
|
|
resolveMethods := flags.StringSlice(cfgResolveOrder, []string{resolver.DNSResolver}, "set bucket name resolve order")
|
|
|
|
|
2022-08-30 10:52:37 +00:00
|
|
|
domains := flags.StringSliceP(cfgListenDomains, "d", nil, "set domains to be listened")
|
2020-12-10 15:11:45 +00:00
|
|
|
|
2020-07-06 09:18:16 +00:00
|
|
|
// set defaults:
|
|
|
|
|
|
|
|
// logger:
|
2020-07-07 11:25:13 +00:00
|
|
|
v.SetDefault(cfgLoggerLevel, "debug")
|
2020-07-06 09:18:16 +00:00
|
|
|
|
2022-07-29 06:26:11 +00:00
|
|
|
// pool:
|
|
|
|
v.SetDefault(cfgPoolErrorThreshold, defaultPoolErrorThreshold)
|
2022-11-15 14:19:21 +00:00
|
|
|
v.SetDefault(cfgStreamTimeout, defaultStreamTimeout)
|
2022-07-29 06:26:11 +00:00
|
|
|
|
2022-07-26 13:29:07 +00:00
|
|
|
v.SetDefault(cfgPProfAddress, "localhost:8085")
|
|
|
|
v.SetDefault(cfgPrometheusAddress, "localhost:8086")
|
|
|
|
|
2023-03-02 14:54:33 +00:00
|
|
|
// kludge
|
|
|
|
v.SetDefault(cfgKludgeUseDefaultXMLNSForCompleteMultipartUpload, false)
|
2023-03-20 08:44:35 +00:00
|
|
|
v.SetDefault(cfgKludgeCompleteMultipartUploadKeepalive, 10*time.Second)
|
2023-03-02 14:54:33 +00:00
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
// Bind flags
|
|
|
|
if err := bindFlags(v, flags); err != nil {
|
|
|
|
panic(fmt.Errorf("bind flags: %w", err))
|
2020-07-06 09:18:16 +00:00
|
|
|
}
|
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
if err := flags.Parse(os.Args); err != nil {
|
2022-07-28 13:26:42 +00:00
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
if v.IsSet(cfgServer+".0."+cfgTLSKeyFile) && v.IsSet(cfgServer+".0."+cfgTLSCertFile) {
|
|
|
|
v.Set(cfgServer+".0."+cfgTLSEnabled, true)
|
2020-07-06 09:18:16 +00:00
|
|
|
}
|
|
|
|
|
2022-01-11 10:09:34 +00:00
|
|
|
if resolveMethods != nil {
|
|
|
|
v.SetDefault(cfgResolveOrder, *resolveMethods)
|
|
|
|
}
|
|
|
|
|
2020-10-19 08:47:13 +00:00
|
|
|
if peers != nil && len(*peers) > 0 {
|
|
|
|
for i := range *peers {
|
|
|
|
v.SetDefault(cfgPeers+"."+strconv.Itoa(i)+".address", (*peers)[i])
|
|
|
|
v.SetDefault(cfgPeers+"."+strconv.Itoa(i)+".weight", 1)
|
2022-11-09 10:07:18 +00:00
|
|
|
v.SetDefault(cfgPeers+"."+strconv.Itoa(i)+".priority", 1)
|
2020-10-19 08:47:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-10 15:11:45 +00:00
|
|
|
if domains != nil && len(*domains) > 0 {
|
2022-08-30 10:52:37 +00:00
|
|
|
v.SetDefault(cfgListenDomains, *domains)
|
2020-12-10 15:11:45 +00:00
|
|
|
}
|
|
|
|
|
2020-07-06 09:18:16 +00:00
|
|
|
switch {
|
|
|
|
case help != nil && *help:
|
2022-12-15 14:08:25 +00:00
|
|
|
fmt.Printf("FrostFS S3 gateway %s\n", version.Version)
|
2020-07-06 09:18:16 +00:00
|
|
|
flags.PrintDefaults()
|
2020-10-19 08:47:13 +00:00
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Println("Default environments:")
|
|
|
|
fmt.Println()
|
|
|
|
keys := v.AllKeys()
|
|
|
|
sort.Strings(keys)
|
|
|
|
|
|
|
|
for i := range keys {
|
|
|
|
if _, ok := ignore[keys[i]]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-07-28 13:27:18 +00:00
|
|
|
defaultValue := v.GetString(keys[i])
|
|
|
|
if len(defaultValue) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-10-19 08:47:13 +00:00
|
|
|
k := strings.Replace(keys[i], ".", "_", -1)
|
2022-07-28 13:27:18 +00:00
|
|
|
fmt.Printf("%s_%s = %s\n", envPrefix, strings.ToUpper(k), defaultValue)
|
2020-10-19 08:47:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Println("Peers preset:")
|
|
|
|
fmt.Println()
|
|
|
|
|
2021-05-20 12:41:32 +00:00
|
|
|
fmt.Printf("%s_%s_[N]_ADDRESS = string\n", envPrefix, strings.ToUpper(cfgPeers))
|
|
|
|
fmt.Printf("%s_%s_[N]_WEIGHT = 0..1 (float)\n", envPrefix, strings.ToUpper(cfgPeers))
|
2020-10-19 08:47:13 +00:00
|
|
|
|
2020-07-06 09:18:16 +00:00
|
|
|
os.Exit(0)
|
2021-05-20 12:41:32 +00:00
|
|
|
case versionFlag != nil && *versionFlag:
|
2022-12-15 14:08:25 +00:00
|
|
|
fmt.Printf("FrostFS S3 Gateway\nVersion: %s\nGoVersion: %s\n", version.Version, runtime.Version())
|
2020-07-06 09:18:16 +00:00
|
|
|
os.Exit(0)
|
|
|
|
}
|
|
|
|
|
2023-02-03 10:00:18 +00:00
|
|
|
if err := readInConfig(v); err != nil {
|
|
|
|
panic(err)
|
2021-06-28 10:44:22 +00:00
|
|
|
}
|
|
|
|
|
2020-07-06 09:18:16 +00:00
|
|
|
return v
|
|
|
|
}
|
2022-09-12 09:45:54 +00:00
|
|
|
|
2022-11-09 10:07:18 +00:00
|
|
|
func bindFlags(v *viper.Viper, flags *pflag.FlagSet) error {
|
|
|
|
if err := v.BindPFlag(cfgPProfEnabled, flags.Lookup(cmdPProf)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgPrometheusEnabled, flags.Lookup(cmdMetrics)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cmdConfig, flags.Lookup(cmdConfig)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-02-03 10:00:18 +00:00
|
|
|
if err := v.BindPFlag(cmdConfigDir, flags.Lookup(cmdConfigDir)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-11-09 10:07:18 +00:00
|
|
|
if err := v.BindPFlag(cfgWalletPath, flags.Lookup(cmdWallet)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgWalletAddress, flags.Lookup(cmdAddress)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgHealthcheckTimeout, flags.Lookup(cfgHealthcheckTimeout)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgConnectTimeout, flags.Lookup(cfgConnectTimeout)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgRebalanceInterval, flags.Lookup(cfgRebalanceInterval)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgMaxClientsCount, flags.Lookup(cfgMaxClientsCount)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgMaxClientsDeadline, flags.Lookup(cfgMaxClientsDeadline)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgRPCEndpoint, flags.Lookup(cfgRPCEndpoint)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := v.BindPFlag(cfgServer+".0.address", flags.Lookup(cmdListenAddress)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgServer+".0."+cfgTLSKeyFile, flags.Lookup(cfgTLSKeyFile)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := v.BindPFlag(cfgServer+".0."+cfgTLSCertFile, flags.Lookup(cfgTLSCertFile)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-02-03 10:00:18 +00:00
|
|
|
func readInConfig(v *viper.Viper) error {
|
|
|
|
if v.IsSet(cmdConfig) {
|
|
|
|
if err := readConfig(v); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v.IsSet(cmdConfigDir) {
|
|
|
|
if err := readConfigDir(v); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func readConfigDir(v *viper.Viper) error {
|
|
|
|
cfgSubConfigDir := v.GetString(cmdConfigDir)
|
|
|
|
entries, err := os.ReadDir(cfgSubConfigDir)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, entry := range entries {
|
|
|
|
if entry.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
ext := path.Ext(entry.Name())
|
|
|
|
if ext != ".yaml" && ext != ".yml" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = mergeConfig(v, path.Join(cfgSubConfigDir, entry.Name())); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-09-12 09:45:54 +00:00
|
|
|
func readConfig(v *viper.Viper) error {
|
2023-02-03 10:00:18 +00:00
|
|
|
for _, fileName := range v.GetStringSlice(cmdConfig) {
|
|
|
|
if err := mergeConfig(v, fileName); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func mergeConfig(v *viper.Viper, fileName string) error {
|
|
|
|
cfgFile, err := os.Open(fileName)
|
2022-09-12 09:45:54 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-02-03 10:00:18 +00:00
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if errClose := cfgFile.Close(); errClose != nil {
|
|
|
|
panic(errClose)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
if err = v.MergeConfig(cfgFile); err != nil {
|
2022-09-12 09:45:54 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-02-03 10:00:18 +00:00
|
|
|
return nil
|
2022-09-12 09:45:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// newLogger constructs a Logger instance for the current application.
|
|
|
|
// Panics on failure.
|
|
|
|
//
|
|
|
|
// Logger contains a logger is built from zap's production logging configuration with:
|
|
|
|
// - parameterized level (debug by default)
|
|
|
|
// - console encoding
|
|
|
|
// - ISO8601 time encoding
|
|
|
|
//
|
|
|
|
// and atomic log level to dynamically change it.
|
|
|
|
//
|
|
|
|
// Logger records a stack trace for all messages at or above fatal level.
|
|
|
|
//
|
|
|
|
// See also zapcore.Level, zap.NewProductionConfig, zap.AddStacktrace.
|
|
|
|
func newLogger(v *viper.Viper) *Logger {
|
|
|
|
lvl, err := getLogLevel(v)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c := zap.NewProductionConfig()
|
|
|
|
c.Level = zap.NewAtomicLevelAt(lvl)
|
|
|
|
c.Encoding = "console"
|
|
|
|
c.EncoderConfig.EncodeTime = zapcore.ISO8601TimeEncoder
|
|
|
|
|
|
|
|
l, err := c.Build(
|
|
|
|
zap.AddStacktrace(zap.NewAtomicLevelAt(zap.FatalLevel)),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("build zap logger instance: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Logger{
|
|
|
|
logger: l,
|
|
|
|
lvl: c.Level,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func getLogLevel(v *viper.Viper) (zapcore.Level, error) {
|
|
|
|
var lvl zapcore.Level
|
|
|
|
lvlStr := v.GetString(cfgLoggerLevel)
|
|
|
|
err := lvl.UnmarshalText([]byte(lvlStr))
|
|
|
|
if err != nil {
|
|
|
|
return lvl, fmt.Errorf("incorrect logger level configuration %s (%v), "+
|
|
|
|
"value should be one of %v", lvlStr, err, [...]zapcore.Level{
|
|
|
|
zapcore.DebugLevel,
|
|
|
|
zapcore.InfoLevel,
|
|
|
|
zapcore.WarnLevel,
|
|
|
|
zapcore.ErrorLevel,
|
|
|
|
zapcore.DPanicLevel,
|
|
|
|
zapcore.PanicLevel,
|
|
|
|
zapcore.FatalLevel,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return lvl, nil
|
|
|
|
}
|