//! Contains type and functions related to Garage configuration file use std::io::Read; use std::net::SocketAddr; use std::path::PathBuf; use serde::{de, Deserialize}; use crate::error::Error; /// Represent the whole configuration #[derive(Deserialize, Debug, Clone)] pub struct Config { /// Path where to store metadata. Should be fast, but low volume pub metadata_dir: PathBuf, /// Path where to store data. Can be slower, but need higher volume pub data_dir: PathBuf, /// Size of data blocks to save to disk #[serde(default = "default_block_size")] pub block_size: usize, /// Replication mode. Supported values: /// - none, 1 -> no replication /// - 2 -> 2-way replication /// - 3 -> 3-way replication // (we can add more aliases for this later) pub replication_mode: String, /// Zstd compression level used on data blocks #[serde( deserialize_with = "deserialize_compression", default = "default_compression" )] pub compression_level: Option, /// RPC secret key: 32 bytes hex encoded /// Note: When using `read_config` this should never be `None` pub rpc_secret: Option, /// Optional file where RPC secret key is read from pub rpc_secret_file: Option, /// Address to bind for RPC pub rpc_bind_addr: SocketAddr, /// Public IP address of this node pub rpc_public_addr: Option, /// Timeout for Netapp's ping messagess pub rpc_ping_timeout_msec: Option, /// Timeout for Netapp RPC calls pub rpc_timeout_msec: Option, // -- Bootstraping and discovery /// Bootstrap peers RPC address #[serde(default)] pub bootstrap_peers: Vec, /// Configuration for automatic node discovery through Consul #[serde(default)] pub consul_discovery: Option, /// Configuration for automatic node discovery through Kubernetes #[serde(default)] pub kubernetes_discovery: Option, // -- DB /// Database engine to use for metadata (options: sled, sqlite, lmdb) #[serde(default = "default_db_engine")] pub db_engine: String, /// Sled cache size, in bytes #[serde(default = "default_sled_cache_capacity")] pub sled_cache_capacity: u64, /// Sled flush interval in milliseconds #[serde(default = "default_sled_flush_every_ms")] pub sled_flush_every_ms: u64, // -- APIs /// Configuration for S3 api pub s3_api: S3ApiConfig, /// Configuration for K2V api pub k2v_api: Option, /// Configuration for serving files as normal web server pub s3_web: Option, /// Configuration for the admin API endpoint #[serde(default = "Default::default")] pub admin: AdminConfig, } /// Configuration for S3 api #[derive(Deserialize, Debug, Clone)] pub struct S3ApiConfig { /// Address and port to bind for api serving pub api_bind_addr: Option, /// S3 region to use pub s3_region: String, /// Suffix to remove from domain name to find bucket. If None, /// vhost-style S3 request are disabled pub root_domain: Option, } /// Configuration for K2V api #[derive(Deserialize, Debug, Clone)] pub struct K2VApiConfig { /// Address and port to bind for api serving pub api_bind_addr: SocketAddr, } /// Configuration for serving files as normal web server #[derive(Deserialize, Debug, Clone)] pub struct WebConfig { /// Address and port to bind for web serving pub bind_addr: SocketAddr, /// Suffix to remove from domain name to find bucket pub root_domain: String, } /// Configuration for the admin and monitoring HTTP API #[derive(Deserialize, Debug, Clone, Default)] pub struct AdminConfig { /// Address and port to bind for admin API serving pub api_bind_addr: Option, /// Bearer token to use to scrape metrics pub metrics_token: Option, /// Bearer token to use to access Admin API endpoints pub admin_token: Option, /// OTLP server to where to export traces pub trace_sink: Option, } #[derive(Deserialize, Debug, Clone)] pub struct ConsulDiscoveryConfig { /// Consul http or https address to connect to to discover more peers pub consul_http_addr: String, /// Consul service name to use pub service_name: String, /// CA TLS certificate to use when connecting to Consul pub ca_cert: Option, /// Client TLS certificate to use when connecting to Consul pub client_cert: Option, /// Client TLS key to use when connecting to Consul pub client_key: Option, /// Skip TLS hostname verification #[serde(default)] pub tls_skip_verify: bool, } #[derive(Deserialize, Debug, Clone)] pub struct KubernetesDiscoveryConfig { /// Kubernetes namespace the service discovery resources are be created in pub namespace: String, /// Service name to filter for in k8s custom resources pub service_name: String, /// Skip creation of the garagenodes CRD #[serde(default)] pub skip_crd: bool, } fn default_db_engine() -> String { "sled".into() } fn default_sled_cache_capacity() -> u64 { 128 * 1024 * 1024 } fn default_sled_flush_every_ms() -> u64 { 2000 } fn default_block_size() -> usize { 1048576 } /// Read and parse configuration pub fn read_config(config_file: PathBuf) -> Result { let mut file = std::fs::OpenOptions::new() .read(true) .open(config_file.as_path())?; let mut config = String::new(); file.read_to_string(&mut config)?; let mut parsed_config: Config = toml::from_str(&config)?; match (&parsed_config.rpc_secret, &parsed_config.rpc_secret_file) { (Some(_), None) => { // no-op } (Some(_), Some(_)) => { return Err("only one of `rpc_secret` and `rpc_secret_file` can be set".into()) } (None, Some(rpc_secret_file_path_string)) => { let mut rpc_secret_file = std::fs::OpenOptions::new() .read(true) .open(rpc_secret_file_path_string)?; let mut rpc_secret_from_file = String::new(); rpc_secret_file.read_to_string(&mut rpc_secret_from_file)?; // trim_end: allows for use case such as `echo "$(openssl rand -hex 32)" > somefile`. // also editors sometimes add a trailing newline parsed_config.rpc_secret = Some(String::from(rpc_secret_from_file.trim_end())); } (None, None) => { return Err("either `rpc_secret` or `rpc_secret_file` needs to be set".into()) } }; Ok(parsed_config) } fn default_compression() -> Option { Some(1) } fn deserialize_compression<'de, D>(deserializer: D) -> Result, D::Error> where D: de::Deserializer<'de>, { use std::convert::TryFrom; struct OptionVisitor; impl<'de> serde::de::Visitor<'de> for OptionVisitor { type Value = Option; fn expecting(&self, formatter: &mut std::fmt::Formatter) -> std::fmt::Result { formatter.write_str("int or 'none'") } fn visit_str(self, value: &str) -> Result where E: de::Error, { if value.eq_ignore_ascii_case("none") { Ok(None) } else { Err(E::custom(format!( "Invalid compression level: '{}', should be a number, or 'none'", value ))) } } fn visit_i64(self, v: i64) -> Result where E: de::Error, { i32::try_from(v) .map(Some) .map_err(|_| E::custom("Compression level out of bound".to_owned())) } fn visit_u64(self, v: u64) -> Result where E: de::Error, { i32::try_from(v) .map(Some) .map_err(|_| E::custom("Compression level out of bound".to_owned())) } } deserializer.deserialize_any(OptionVisitor) } #[cfg(test)] mod tests { use crate::error::Error; use std::fs::File; use std::io::Write; #[test] fn test_rpc_secret_is_required() -> Result<(), Error> { let path1 = mktemp::Temp::new_file()?; let mut file1 = File::create(path1.as_path())?; writeln!( file1, r#" metadata_dir = "/tmp/garage/meta" data_dir = "/tmp/garage/data" replication_mode = "3" rpc_bind_addr = "[::]:3901" [s3_api] s3_region = "garage" api_bind_addr = "[::]:3900" "# )?; assert_eq!( "either `rpc_secret` or `rpc_secret_file` needs to be set", super::read_config(path1.to_path_buf()) .unwrap_err() .to_string() ); drop(path1); drop(file1); let path2 = mktemp::Temp::new_file()?; let mut file2 = File::create(path2.as_path())?; writeln!( file2, r#" metadata_dir = "/tmp/garage/meta" data_dir = "/tmp/garage/data" replication_mode = "3" rpc_bind_addr = "[::]:3901" rpc_secret = "foo" [s3_api] s3_region = "garage" api_bind_addr = "[::]:3900" "# )?; let config = super::read_config(path2.to_path_buf())?; assert_eq!("foo", config.rpc_secret.unwrap()); drop(path2); drop(file2); Ok(()) } #[test] fn test_rpc_secret_file_works() -> Result<(), Error> { let path_secret = mktemp::Temp::new_file()?; let mut file_secret = File::create(path_secret.as_path())?; writeln!(file_secret, "foo")?; drop(file_secret); let path_config = mktemp::Temp::new_file()?; let mut file_config = File::create(path_config.as_path())?; let path_secret_path = path_secret.as_path().display(); writeln!( file_config, r#" metadata_dir = "/tmp/garage/meta" data_dir = "/tmp/garage/data" replication_mode = "3" rpc_bind_addr = "[::]:3901" rpc_secret_file = "{path_secret_path}" [s3_api] s3_region = "garage" api_bind_addr = "[::]:3900" "# )?; let config = super::read_config(path_config.to_path_buf())?; assert_eq!("foo", config.rpc_secret.unwrap()); drop(path_config); drop(path_secret); drop(file_config); Ok(()) } #[test] fn test_rcp_secret_and_rpc_secret_file_cannot_be_set_both() -> Result<(), Error> { let path_config = mktemp::Temp::new_file()?; let mut file_config = File::create(path_config.as_path())?; writeln!( file_config, r#" metadata_dir = "/tmp/garage/meta" data_dir = "/tmp/garage/data" replication_mode = "3" rpc_bind_addr = "[::]:3901" rpc_secret= "dummy" rpc_secret_file = "dummy" [s3_api] s3_region = "garage" api_bind_addr = "[::]:3900" "# )?; assert_eq!( "only one of `rpc_secret` and `rpc_secret_file` can be set", super::read_config(path_config.to_path_buf()) .unwrap_err() .to_string() ); drop(path_config); drop(file_config); Ok(()) } }