Phase G0 Day 2 ships storaged: aws-sdk-go-v2 wrapper + chi routes
binding 127.0.0.1:3211 with 256 MiB MaxBytesReader, Content-Length
up-front 413, and a 4-slot non-blocking semaphore returning 503 +
Retry-After:5 when full. Acceptance smoke (6/6 probes) PASSES against
the dedicated MinIO bucket lakehouse-go-primary, isolated from the
Rust system's lakehouse bucket during coexistence.
Cross-lineage scrum on the shipped code:
- Opus 4.7 (opencode): 1 BLOCK + 3 WARN + 3 INFO
- Qwen3-coder (openrouter): 2 BLOCK + 1 WARN + 1 INFO (3 false positives)
- Kimi K2-0905 (openrouter, after route-shopping past opencode's 4k
cap and the direct adapter's empty-content reasoning bug):
1 BLOCK + 2 WARN + 1 INFO
Fixed:
C1 buildRegistry ctx cancel footgun → context.Background()
(Opus + Kimi convergent; future credential refresh chains)
C2 MaxBytesReader unwrap through manager.Uploader multipart
goroutines → Content-Length up-front 413 + string-suffix fallback
(Opus + Kimi convergent; latent 500-instead-of-413 in 5-256 MiB range)
C3 Bucket.List unbounded accumulation → MaxListResults=10_000 cap
(Opus + Kimi convergent; OOM guard)
S1 PUT response Content-Type: application/json (Opus single-reviewer)
Strict validateKey policy (J approved): rejects empty, >1024B, NUL,
leading "/", ".." path components, CR/LF/tab control characters.
DELETE exposed at HTTP layer (J approved option A) for symmetry +
smoke ergonomics.
Build clean, vet clean, all unit tests pass, smoke 6/6 PASS after
every fix round. go.mod 1.23 → 1.24 (required by aws-sdk-go-v2).
Process finding worth recording: opencode caps non-streaming Kimi at
max_tokens=4096; the direct kimi.com adapter consumed 8192 tokens of
reasoning but surfaced empty content; openrouter/moonshotai/kimi-k2-0905
delivered structured output in ~33s. Future Kimi scrums should default
to that route.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
32 lines
882 B
TOML
32 lines
882 B
TOML
# Lakehouse-Go config — G0 dev defaults. Overrides via env are a
|
|
# G1+ concern; for G0 edit this file and restart the affected service.
|
|
|
|
# G0 dev ports — shifted to 3110+ so the Go services run alongside
|
|
# the live Rust lakehouse on 3100/3201-3204 without colliding. G5
|
|
# (demo cutover) flips gateway back to 3100 when Rust retires.
|
|
[gateway]
|
|
bind = "127.0.0.1:3110"
|
|
|
|
[storaged]
|
|
bind = "127.0.0.1:3211"
|
|
|
|
[catalogd]
|
|
bind = "127.0.0.1:3212"
|
|
|
|
[ingestd]
|
|
bind = "127.0.0.1:3213"
|
|
|
|
[queryd]
|
|
bind = "127.0.0.1:3214"
|
|
|
|
[s3]
|
|
endpoint = "http://localhost:9000"
|
|
region = "us-east-1"
|
|
bucket = "lakehouse-go-primary" # G0 dedicated bucket so Rust + Go coexist
|
|
access_key_id = "" # populated by SecretsProvider from /etc/lakehouse/secrets-go.toml
|
|
secret_access_key = "" # ditto
|
|
use_path_style = true
|
|
|
|
[log]
|
|
level = "info"
|