mirror of
https://github.com/logos-storage/logos-storage-nim.git
synced 2026-01-03 22:13:12 +00:00
* setting up * Implements timer utility * applies async and cancellation to timer loop * Sets up mocktimer and mockblockstore to set up first maintenance module test * wip: first test that calls blockChecker * wip: adding user type to timer callback * Chronicles doesn't like type-arguments? Disables logging in timer module for now * Implementing block check test for blockMaintainer module * Sets up additional tests for blockmaintainer * Removes generic from timer module. Implements numberOfBlocks per interval in blockMaintainer. * Implements blockMaintainer * Sets up tests for blockChecker * Some comments by Mark * Cleanup repostore tests * Setting up the use of std/times for block TTL tracking * repostore adds expiration timestamp * Defaults the repostore clock to the system clock * Applies updates to repostore interface. * Implements retrieving of block expiration information from repostore * Sets up tests for maintenance module behavior * Implements block maintenance module * Wires maintenance module into codex. Sets up integration tests for block expiration * Sets up test for missing behavior: removing timestamp metadata on block delete * Implements removing of expiration metadata in repoStore * Fixes integration tests for block expiration * Adds block expiration tests to integration test run * Handled some comments by Dmitriy * Review comment by Dmitriy: Removes seq[cid] from runBlockCheck * Review comment by Dmitriy: Moves key formatting methods to keyutils. * Review comment by Dmitriy: Encodes durations using chronos * Fixes conversion of TTL type in conf. * Review comments by Dmitriy * Adds unit tests for keyUtils. * Adds test coverage for exception in maintenance module
49 lines
1.4 KiB
Nim
49 lines
1.4 KiB
Nim
## Nim-Codex
|
|
## Copyright (c) 2022 Status Research & Development GmbH
|
|
## Licensed under either of
|
|
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
## at your option.
|
|
## This file may not be copied, modified, or distributed except according to
|
|
## those terms.
|
|
|
|
import pkg/upraises
|
|
push: {.upraises: [].}
|
|
|
|
import pkg/chronicles
|
|
import pkg/questionable/results
|
|
import pkg/libp2p
|
|
import pkg/datastore
|
|
|
|
import ./fileutils
|
|
import ../errors
|
|
import ../rng
|
|
import ../namespaces
|
|
|
|
const
|
|
SafePermissions = {UserRead, UserWrite}
|
|
|
|
type
|
|
CodexKeyError = object of CodexError
|
|
CodexKeyUnsafeError = object of CodexKeyError
|
|
|
|
proc setupKey*(path: string): ?!PrivateKey =
|
|
if not path.fileAccessible({AccessFlags.Find}):
|
|
info "Creating a private key and saving it"
|
|
let
|
|
res = ? PrivateKey.random(Rng.instance()[]).mapFailure(CodexKeyError)
|
|
bytes = ? res.getBytes().mapFailure(CodexKeyError)
|
|
|
|
? path.secureWriteFile(bytes).mapFailure(CodexKeyError)
|
|
return PrivateKey.init(bytes).mapFailure(CodexKeyError)
|
|
|
|
info "Found a network private key"
|
|
if not ? checkSecureFile(path).mapFailure(CodexKeyError):
|
|
warn "The network private key file is not safe, aborting"
|
|
return failure newException(
|
|
CodexKeyUnsafeError, "The network private key file is not safe")
|
|
|
|
return PrivateKey.init(
|
|
? path.readAllBytes().mapFailure(CodexKeyError))
|
|
.mapFailure(CodexKeyError)
|