1use std::{
2 net::SocketAddr,
3 path::PathBuf,
4 sync::Arc,
5 time::{Duration, SystemTime},
6};
7
8use axum_server::tls_rustls::RustlsConfig;
9use bytesize::ByteSize;
10use slatedb::object_store;
11use tokio::time::Instant;
12use tower_http::{
13 cors::CorsLayer,
14 trace::{DefaultMakeSpan, DefaultOnRequest, DefaultOnResponse, TraceLayer},
15};
16use tracing::info;
17
18use crate::{backend::Backend, handlers, init};
19
20#[derive(clap::Args, Debug, Clone)]
21pub struct TlsConfig {
22 #[arg(long, conflicts_with_all = ["tls_cert", "tls_key"])]
24 pub tls_self: bool,
25
26 #[arg(long, requires = "tls_key")]
29 pub tls_cert: Option<PathBuf>,
30
31 #[arg(long, requires = "tls_cert")]
34 pub tls_key: Option<PathBuf>,
35}
36
37#[derive(clap::Args, Debug, Clone)]
38pub struct LiteArgs {
39 #[arg(long)]
43 pub bucket: Option<String>,
44
45 #[arg(long, value_name = "DIR", conflicts_with = "bucket")]
49 pub local_root: Option<PathBuf>,
50
51 #[arg(long, default_value = "")]
53 pub path: String,
54
55 #[command(flatten)]
57 pub tls: TlsConfig,
58
59 #[arg(long)]
61 pub port: Option<u16>,
62
63 #[arg(long)]
70 pub no_cors: bool,
71
72 #[arg(long, env = "S2LITE_INIT_FILE")]
77 pub init_file: Option<PathBuf>,
78
79 #[arg(long, default_value = "128MiB")]
81 pub append_inflight_bytes: ByteSize,
82}
83
84#[derive(Debug, Clone)]
85enum StoreType {
86 S3Bucket(String),
87 LocalFileSystem(PathBuf),
88 InMemory,
89}
90
91impl StoreType {
92 fn default_flush_interval(&self) -> Duration {
93 Duration::from_millis(match self {
94 StoreType::S3Bucket(_) => 50,
95 StoreType::LocalFileSystem(_) | StoreType::InMemory => 5,
96 })
97 }
98}
99
100pub async fn run(args: LiteArgs) -> eyre::Result<()> {
101 info!(?args);
102
103 let addr = {
104 let port = args.port.unwrap_or_else(|| {
105 if args.tls.tls_self || args.tls.tls_cert.is_some() {
106 443
107 } else {
108 80
109 }
110 });
111 format!("0.0.0.0:{port}")
112 };
113
114 let store_type = if let Some(bucket) = args.bucket {
115 StoreType::S3Bucket(bucket)
116 } else if let Some(local_root) = args.local_root {
117 StoreType::LocalFileSystem(local_root)
118 } else {
119 StoreType::InMemory
120 };
121
122 let object_store = init_object_store(&store_type).await?;
123
124 let db_settings = slatedb::Settings::from_env_with_default(
125 "SL8_",
126 slatedb::Settings {
127 flush_interval: Some(store_type.default_flush_interval()),
128 ..Default::default()
129 },
130 )?;
131
132 let manifest_poll_interval = db_settings.manifest_poll_interval;
133
134 let db = slatedb::Db::builder(args.path, object_store)
135 .with_settings(db_settings)
136 .build()
137 .await?;
138
139 info!(
140 ?manifest_poll_interval,
141 "sleeping to ensure prior instance fenced out"
142 );
143
144 tokio::time::sleep(manifest_poll_interval).await;
145
146 info!(%args.append_inflight_bytes, "starting backend");
147 let backend = Backend::new(db, args.append_inflight_bytes);
148 crate::backend::bgtasks::spawn(&backend);
149
150 if let Some(init_file) = &args.init_file {
151 let spec = init::load(init_file)?;
152 init::apply(&backend, spec).await?;
153 }
154
155 let mut app = handlers::router().with_state(backend).layer(
156 TraceLayer::new_for_http()
157 .make_span_with(DefaultMakeSpan::new().level(tracing::Level::INFO))
158 .on_request(DefaultOnRequest::new().level(tracing::Level::DEBUG))
159 .on_response(DefaultOnResponse::new().level(tracing::Level::INFO)),
160 );
161
162 if !args.no_cors {
163 app = app.layer(CorsLayer::very_permissive());
164 }
165
166 let server_handle = axum_server::Handle::new();
167 tokio::spawn(shutdown_signal(server_handle.clone()));
168 match (
169 args.tls.tls_self,
170 args.tls.tls_cert.clone(),
171 args.tls.tls_key.clone(),
172 ) {
173 (false, Some(cert_path), Some(key_path)) => {
174 info!(
175 addr,
176 ?cert_path,
177 "starting https server with provided certificate"
178 );
179 let rustls_config = RustlsConfig::from_pem_file(cert_path, key_path).await?;
180 axum_server::bind_rustls(addr.parse()?, rustls_config)
181 .handle(server_handle)
182 .serve(app.into_make_service())
183 .await?;
184 }
185 (true, None, None) => {
186 info!(
187 addr,
188 "starting https server with self-signed certificate, clients will need to use --insecure"
189 );
190 let rcgen::CertifiedKey { cert, signing_key } = rcgen::generate_simple_self_signed([
191 "localhost".to_string(),
192 "127.0.0.1".to_string(),
193 "::1".to_string(),
194 ])?;
195 let rustls_config = RustlsConfig::from_pem(
196 cert.pem().into_bytes(),
197 signing_key.serialize_pem().into_bytes(),
198 )
199 .await?;
200 axum_server::bind_rustls(addr.parse()?, rustls_config)
201 .handle(server_handle)
202 .serve(app.into_make_service())
203 .await?;
204 }
205 (false, None, None) => {
206 info!(addr, "starting plain http server");
207 axum_server::bind(addr.parse()?)
208 .handle(server_handle)
209 .serve(app.into_make_service())
210 .await?;
211 }
212 _ => {
213 return Err(eyre::eyre!("Invalid TLS configuration"));
215 }
216 }
217
218 Ok(())
219}
220
221async fn init_object_store(
222 store_type: &StoreType,
223) -> eyre::Result<Arc<dyn object_store::ObjectStore>> {
224 Ok(match store_type {
225 StoreType::S3Bucket(bucket) => {
226 info!(bucket, "using s3 object store");
227 let mut builder =
228 object_store::aws::AmazonS3Builder::from_env().with_bucket_name(bucket);
229 match (
230 std::env::var_os("AWS_ENDPOINT_URL_S3").and_then(|s| s.into_string().ok()),
231 std::env::var_os("AWS_ACCESS_KEY_ID").and_then(|s| s.into_string().ok()),
232 std::env::var_os("AWS_SECRET_ACCESS_KEY").and_then(|s| s.into_string().ok()),
233 ) {
234 (endpoint, Some(key_id), Some(secret_key)) => {
235 info!(endpoint, key_id, "using static credentials from env vars");
236
237 if let Some(endpoint) = endpoint {
238 if endpoint.starts_with("http://") {
239 builder = builder.with_allow_http(true);
240 }
241 builder = builder.with_endpoint(endpoint);
242 }
243
244 builder = builder.with_credentials(Arc::new(
245 object_store::StaticCredentialProvider::new(
246 object_store::aws::AwsCredential {
247 key_id,
248 secret_key,
249 token: None,
250 },
251 ),
252 ));
253 }
254 _ => {
255 let aws_config =
256 aws_config::load_defaults(aws_config::BehaviorVersion::latest()).await;
257 if let Some(region) = aws_config.region() {
258 info!(region = region.as_ref());
259 builder = builder.with_region(region.to_string());
260 }
261 if let Some(credentials_provider) = aws_config.credentials_provider() {
262 info!("using aws-config credentials provider");
263 builder = builder.with_credentials(Arc::new(S3CredentialProvider {
264 aws: credentials_provider.clone(),
265 cache: tokio::sync::Mutex::new(None),
266 }));
267 }
268 }
269 }
270 Arc::new(builder.build()?) as Arc<dyn object_store::ObjectStore>
271 }
272 StoreType::LocalFileSystem(local_root) => {
273 std::fs::create_dir_all(local_root)?;
274 info!(
275 root = %local_root.display(),
276 "using local filesystem object store"
277 );
278 Arc::new(object_store::local::LocalFileSystem::new_with_prefix(
279 local_root,
280 )?)
281 }
282 StoreType::InMemory => {
283 info!("using in-memory object store");
284 Arc::new(object_store::memory::InMemory::new())
285 }
286 })
287}
288
289async fn shutdown_signal(handle: axum_server::Handle<SocketAddr>) {
290 let ctrl_c = async {
291 tokio::signal::ctrl_c().await.expect("ctrl-c");
292 };
293
294 #[cfg(unix)]
295 let term = async {
296 tokio::signal::unix::signal(tokio::signal::unix::SignalKind::terminate())
297 .expect("SIGTERM")
298 .recv()
299 .await;
300 };
301
302 #[cfg(not(unix))]
303 let term = std::future::pending::<()>();
304
305 tokio::select! {
306 _ = ctrl_c => {
307 info!("received Ctrl+C, starting graceful shutdown");
308 },
309 _ = term => {
310 info!("received SIGTERM, starting graceful shutdown");
311 },
312 }
313
314 handle.graceful_shutdown(Some(Duration::from_secs(10)));
315}
316
317#[derive(Debug)]
318struct CachedCredential {
319 credential: Arc<object_store::aws::AwsCredential>,
320 expiry: Option<SystemTime>,
321}
322
323impl CachedCredential {
324 fn is_valid(&self) -> bool {
325 self.expiry
326 .is_none_or(|exp| exp > SystemTime::now() + Duration::from_secs(60))
327 }
328}
329
330#[derive(Debug)]
331struct S3CredentialProvider {
332 aws: aws_credential_types::provider::SharedCredentialsProvider,
333 cache: tokio::sync::Mutex<Option<CachedCredential>>,
334}
335
336#[async_trait::async_trait]
337impl object_store::CredentialProvider for S3CredentialProvider {
338 type Credential = object_store::aws::AwsCredential;
339
340 async fn get_credential(&self) -> object_store::Result<Arc<object_store::aws::AwsCredential>> {
341 let mut cached = self.cache.lock().await;
342 if let Some(cached) = cached.as_ref().filter(|c| c.is_valid()) {
343 return Ok(cached.credential.clone());
344 }
345
346 use aws_credential_types::provider::ProvideCredentials as _;
347
348 let start = Instant::now();
349 let creds =
350 self.aws
351 .provide_credentials()
352 .await
353 .map_err(|e| object_store::Error::Generic {
354 store: "S3",
355 source: Box::new(e),
356 })?;
357 info!(
358 key_id = creds.access_key_id(),
359 expiry_s = creds
360 .expiry()
361 .and_then(|t| t.duration_since(SystemTime::now()).ok())
362 .map(|d| d.as_secs()),
363 elapsed_ms = start.elapsed().as_millis(),
364 "fetched credentials"
365 );
366 let credential = Arc::new(object_store::aws::AwsCredential {
367 key_id: creds.access_key_id().to_owned(),
368 secret_key: creds.secret_access_key().to_owned(),
369 token: creds.session_token().map(|s| s.to_owned()),
370 });
371 *cached = Some(CachedCredential {
372 credential: credential.clone(),
373 expiry: creds.expiry(),
374 });
375 Ok(credential)
376 }
377}