package object import ( "context" "crypto/ecdsa" "fmt" "strconv" "testing" objectV2 "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/object" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/container" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" containerSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container" cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id" cidtest "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id/test" frostfsecdsa "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/crypto/ecdsa" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/netmap" objectSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object" oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id" oidtest "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id/test" sessiontest "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session/test" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/user" "github.com/google/uuid" "github.com/nspcc-dev/neo-go/pkg/crypto/keys" "github.com/stretchr/testify/require" "go.uber.org/zap/zaptest" ) func blankValidObject(key *ecdsa.PrivateKey) *objectSDK.Object { var idOwner user.ID user.IDFromKey(&idOwner, key.PublicKey) obj := objectSDK.New() obj.SetContainerID(cidtest.ID()) obj.SetOwnerID(idOwner) return obj } type testNetState struct { epoch uint64 } func (s testNetState) CurrentEpoch() uint64 { return s.epoch } type testLockSource struct { m map[oid.Address]bool } func (t testLockSource) IsLocked(_ context.Context, address oid.Address) (bool, error) { return t.m[address], nil } func TestFormatValidator_Validate(t *testing.T) { const curEpoch = 13 ls := testLockSource{ m: make(map[oid.Address]bool), } v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) ownerKey, err := keys.NewPrivateKey() require.NoError(t, err) t.Run("nil input", func(t *testing.T) { require.Error(t, v.Validate(context.Background(), nil, true)) }) t.Run("nil identifier", func(t *testing.T) { obj := objectSDK.New() require.ErrorIs(t, v.Validate(context.Background(), obj, false), errNilID) }) t.Run("nil container identifier", func(t *testing.T) { obj := objectSDK.New() obj.SetID(oidtest.ID()) require.ErrorIs(t, v.Validate(context.Background(), obj, true), errNilCID) }) t.Run("unsigned object", func(t *testing.T) { obj := objectSDK.New() obj.SetContainerID(cidtest.ID()) obj.SetID(oidtest.ID()) require.Error(t, v.Validate(context.Background(), obj, false)) }) t.Run("correct w/ session token", func(t *testing.T) { var idOwner user.ID user.IDFromKey(&idOwner, ownerKey.PrivateKey.PublicKey) tok := sessiontest.Object() err := tok.Sign(ownerKey.PrivateKey) require.NoError(t, err) obj := objectSDK.New() obj.SetContainerID(cidtest.ID()) obj.SetSessionToken(tok) obj.SetOwnerID(idOwner) require.NoError(t, objectSDK.SetIDWithSignature(ownerKey.PrivateKey, obj)) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("correct w/o session token", func(t *testing.T) { obj := blankValidObject(&ownerKey.PrivateKey) require.NoError(t, objectSDK.SetIDWithSignature(ownerKey.PrivateKey, obj)) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("tombstone content", func(t *testing.T) { obj := objectSDK.New() obj.SetType(objectSDK.TypeTombstone) obj.SetContainerID(cidtest.ID()) _, err := v.ValidateContent(obj) require.Error(t, err) // no tombstone content content := objectSDK.NewTombstone() content.SetMembers([]oid.ID{oidtest.ID()}) data, err := content.Marshal() require.NoError(t, err) obj.SetPayload(data) _, err = v.ValidateContent(obj) require.Error(t, err) // no members in tombstone content.SetMembers([]oid.ID{oidtest.ID()}) data, err = content.Marshal() require.NoError(t, err) obj.SetPayload(data) _, err = v.ValidateContent(obj) require.Error(t, err) // no expiration epoch in tombstone var expirationAttribute objectSDK.Attribute expirationAttribute.SetKey(objectV2.SysAttributeExpEpoch) expirationAttribute.SetValue(strconv.Itoa(10)) obj.SetAttributes(expirationAttribute) _, err = v.ValidateContent(obj) require.Error(t, err) // different expiration values id := oidtest.ID() content.SetExpirationEpoch(10) content.SetMembers([]oid.ID{id}) data, err = content.Marshal() require.NoError(t, err) obj.SetPayload(data) contentGot, err := v.ValidateContent(obj) require.NoError(t, err) // all good require.EqualValues(t, []oid.ID{id}, contentGot.Objects()) require.Equal(t, objectSDK.TypeTombstone, contentGot.Type()) }) t.Run("expiration", func(t *testing.T) { fn := func(val string) *objectSDK.Object { obj := blankValidObject(&ownerKey.PrivateKey) var a objectSDK.Attribute a.SetKey(objectV2.SysAttributeExpEpoch) a.SetValue(val) obj.SetAttributes(a) require.NoError(t, objectSDK.SetIDWithSignature(ownerKey.PrivateKey, obj)) return obj } t.Run("invalid attribute value", func(t *testing.T) { val := "text" err := v.Validate(context.Background(), fn(val), false) require.Error(t, err) }) t.Run("expired object", func(t *testing.T) { val := strconv.FormatUint(curEpoch-1, 10) obj := fn(val) t.Run("non-locked", func(t *testing.T) { err := v.Validate(context.Background(), obj, false) require.ErrorIs(t, err, errExpired) }) t.Run("locked", func(t *testing.T) { var addr oid.Address oID, _ := obj.ID() cID, _ := obj.ContainerID() addr.SetContainer(cID) addr.SetObject(oID) ls.m[addr] = true err := v.Validate(context.Background(), obj, false) require.NoError(t, err) }) }) t.Run("alive object", func(t *testing.T) { val := strconv.FormatUint(curEpoch, 10) err := v.Validate(context.Background(), fn(val), true) require.NoError(t, err) }) }) t.Run("attributes", func(t *testing.T) { t.Run("duplication", func(t *testing.T) { obj := blankValidObject(&ownerKey.PrivateKey) var a1 objectSDK.Attribute a1.SetKey("key1") a1.SetValue("val1") var a2 objectSDK.Attribute a2.SetKey("key2") a2.SetValue("val2") obj.SetAttributes(a1, a2) err := v.checkAttributes(obj) require.NoError(t, err) a2.SetKey(a1.Key()) obj.SetAttributes(a1, a2) err = v.checkAttributes(obj) require.Equal(t, errDuplAttr, err) }) t.Run("empty value", func(t *testing.T) { obj := blankValidObject(&ownerKey.PrivateKey) var a objectSDK.Attribute a.SetKey("key") obj.SetAttributes(a) err := v.checkAttributes(obj) require.Equal(t, errEmptyAttrVal, err) }) }) } func TestFormatValidator_ValidateTokenIssuer(t *testing.T) { const curEpoch = 13 ls := testLockSource{ m: make(map[oid.Address]bool), } signer, err := keys.NewPrivateKey() require.NoError(t, err) var owner user.ID ownerPrivKey, err := keys.NewPrivateKey() require.NoError(t, err) user.IDFromKey(&owner, ownerPrivKey.PrivateKey.PublicKey) t.Run("different issuer and owner, verify issuer disabled", func(t *testing.T) { t.Parallel() v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithVerifySessionTokenIssuer(false), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) tok := sessiontest.Object() fsPubKey := frostfsecdsa.PublicKey(*signer.PublicKey()) tok.SetID(uuid.New()) tok.SetAuthKey(&fsPubKey) tok.SetExp(100500) tok.SetIat(1) tok.SetNbf(1) require.NoError(t, tok.Sign(signer.PrivateKey)) obj := objectSDK.New() obj.SetContainerID(cidtest.ID()) obj.SetSessionToken(tok) obj.SetOwnerID(owner) require.NoError(t, objectSDK.SetIDWithSignature(signer.PrivateKey, obj)) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("different issuer and owner, issuer is IR node, verify issuer enabled", func(t *testing.T) { t.Parallel() cnrID := cidtest.ID() cont := containerSDK.Container{} cont.Init() pp := netmap.PlacementPolicy{} require.NoError(t, pp.DecodeString("REP 1")) cont.SetPlacementPolicy(pp) v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithVerifySessionTokenIssuer(true), WithInnerRing(&testIRSource{ irNodes: [][]byte{signer.PublicKey().Bytes()}, }), WithContainersSource( &testContainerSource{ containers: map[cid.ID]*container.Container{ cnrID: { Value: cont, }, }, }, ), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) tok := sessiontest.Object() fsPubKey := frostfsecdsa.PublicKey(*signer.PublicKey()) tok.SetID(uuid.New()) tok.SetAuthKey(&fsPubKey) tok.SetExp(100500) tok.SetIat(1) tok.SetNbf(1) require.NoError(t, tok.Sign(signer.PrivateKey)) obj := objectSDK.New() obj.SetContainerID(cnrID) obj.SetSessionToken(tok) obj.SetOwnerID(owner) require.NoError(t, objectSDK.SetIDWithSignature(signer.PrivateKey, obj)) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("different issuer and owner, issuer is container node in current epoch, verify issuer enabled", func(t *testing.T) { t.Parallel() tok := sessiontest.Object() fsPubKey := frostfsecdsa.PublicKey(*signer.PublicKey()) tok.SetID(uuid.New()) tok.SetAuthKey(&fsPubKey) tok.SetExp(100500) tok.SetIat(1) tok.SetNbf(1) require.NoError(t, tok.Sign(signer.PrivateKey)) cnrID := cidtest.ID() cont := containerSDK.Container{} cont.Init() pp := netmap.PlacementPolicy{} require.NoError(t, pp.DecodeString("REP 1")) cont.SetPlacementPolicy(pp) var node netmap.NodeInfo node.SetPublicKey(signer.PublicKey().Bytes()) currentEpochNM := &netmap.NetMap{} currentEpochNM.SetEpoch(curEpoch) currentEpochNM.SetNodes([]netmap.NodeInfo{node}) obj := objectSDK.New() obj.SetContainerID(cnrID) obj.SetSessionToken(tok) obj.SetOwnerID(owner) require.NoError(t, objectSDK.SetIDWithSignature(signer.PrivateKey, obj)) v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithVerifySessionTokenIssuer(true), WithInnerRing(&testIRSource{ irNodes: [][]byte{}, }), WithContainersSource( &testContainerSource{ containers: map[cid.ID]*container.Container{ cnrID: { Value: cont, }, }, }, ), WithNetmapSource( &testNetmapSource{ netmaps: map[uint64]*netmap.NetMap{ curEpoch: currentEpochNM, }, currentEpoch: curEpoch, }, ), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("different issuer and owner, issuer is container node in previous epoch, verify issuer enabled", func(t *testing.T) { t.Parallel() tok := sessiontest.Object() fsPubKey := frostfsecdsa.PublicKey(*signer.PublicKey()) tok.SetID(uuid.New()) tok.SetAuthKey(&fsPubKey) tok.SetExp(100500) tok.SetIat(1) tok.SetNbf(1) require.NoError(t, tok.Sign(signer.PrivateKey)) cnrID := cidtest.ID() cont := containerSDK.Container{} cont.Init() pp := netmap.PlacementPolicy{} require.NoError(t, pp.DecodeString("REP 1")) cont.SetPlacementPolicy(pp) var issuerNode netmap.NodeInfo issuerNode.SetPublicKey(signer.PublicKey().Bytes()) var nonIssuerNode netmap.NodeInfo nonIssuerKey, err := keys.NewPrivateKey() require.NoError(t, err) nonIssuerNode.SetPublicKey(nonIssuerKey.PublicKey().Bytes()) currentEpochNM := &netmap.NetMap{} currentEpochNM.SetEpoch(curEpoch) currentEpochNM.SetNodes([]netmap.NodeInfo{nonIssuerNode}) previousEpochNM := &netmap.NetMap{} previousEpochNM.SetEpoch(curEpoch - 1) previousEpochNM.SetNodes([]netmap.NodeInfo{issuerNode}) obj := objectSDK.New() obj.SetContainerID(cnrID) obj.SetSessionToken(tok) obj.SetOwnerID(owner) require.NoError(t, objectSDK.SetIDWithSignature(signer.PrivateKey, obj)) v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithVerifySessionTokenIssuer(true), WithInnerRing(&testIRSource{ irNodes: [][]byte{}, }), WithContainersSource( &testContainerSource{ containers: map[cid.ID]*container.Container{ cnrID: { Value: cont, }, }, }, ), WithNetmapSource( &testNetmapSource{ netmaps: map[uint64]*netmap.NetMap{ curEpoch: currentEpochNM, curEpoch - 1: previousEpochNM, }, currentEpoch: curEpoch, }, ), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) require.NoError(t, v.Validate(context.Background(), obj, false)) }) t.Run("different issuer and owner, issuer is unknown, verify issuer enabled", func(t *testing.T) { t.Parallel() tok := sessiontest.Object() fsPubKey := frostfsecdsa.PublicKey(*signer.PublicKey()) tok.SetID(uuid.New()) tok.SetAuthKey(&fsPubKey) tok.SetExp(100500) tok.SetIat(1) tok.SetNbf(1) require.NoError(t, tok.Sign(signer.PrivateKey)) cnrID := cidtest.ID() cont := containerSDK.Container{} cont.Init() pp := netmap.PlacementPolicy{} require.NoError(t, pp.DecodeString("REP 1")) cont.SetPlacementPolicy(pp) var nonIssuerNode1 netmap.NodeInfo nonIssuerKey1, err := keys.NewPrivateKey() require.NoError(t, err) nonIssuerNode1.SetPublicKey(nonIssuerKey1.PublicKey().Bytes()) var nonIssuerNode2 netmap.NodeInfo nonIssuerKey2, err := keys.NewPrivateKey() require.NoError(t, err) nonIssuerNode2.SetPublicKey(nonIssuerKey2.PublicKey().Bytes()) currentEpochNM := &netmap.NetMap{} currentEpochNM.SetEpoch(curEpoch) currentEpochNM.SetNodes([]netmap.NodeInfo{nonIssuerNode1}) previousEpochNM := &netmap.NetMap{} previousEpochNM.SetEpoch(curEpoch - 1) previousEpochNM.SetNodes([]netmap.NodeInfo{nonIssuerNode2}) obj := objectSDK.New() obj.SetContainerID(cnrID) obj.SetSessionToken(tok) obj.SetOwnerID(owner) require.NoError(t, objectSDK.SetIDWithSignature(signer.PrivateKey, obj)) v := NewFormatValidator( WithNetState(testNetState{ epoch: curEpoch, }), WithLockSource(ls), WithVerifySessionTokenIssuer(true), WithInnerRing(&testIRSource{ irNodes: [][]byte{}, }), WithContainersSource( &testContainerSource{ containers: map[cid.ID]*container.Container{ cnrID: { Value: cont, }, }, }, ), WithNetmapSource( &testNetmapSource{ netmaps: map[uint64]*netmap.NetMap{ curEpoch: currentEpochNM, curEpoch - 1: previousEpochNM, }, currentEpoch: curEpoch, }, ), WithLogger(&logger.Logger{Logger: zaptest.NewLogger(t)}), ) require.Error(t, v.Validate(context.Background(), obj, false)) }) } type testIRSource struct { irNodes [][]byte } func (s *testIRSource) InnerRingKeys() ([][]byte, error) { return s.irNodes, nil } type testContainerSource struct { containers map[cid.ID]*container.Container } func (s *testContainerSource) Get(cnrID cid.ID) (*container.Container, error) { if cnr, found := s.containers[cnrID]; found { return cnr, nil } return nil, fmt.Errorf("container not found") } func (s *testContainerSource) DeletionInfo(cid.ID) (*container.DelInfo, error) { return nil, nil } type testNetmapSource struct { netmaps map[uint64]*netmap.NetMap currentEpoch uint64 } func (s *testNetmapSource) GetNetMap(diff uint64) (*netmap.NetMap, error) { if diff >= s.currentEpoch { return nil, fmt.Errorf("invalid diff") } return s.GetNetMapByEpoch(s.currentEpoch - diff) } func (s *testNetmapSource) GetNetMapByEpoch(epoch uint64) (*netmap.NetMap, error) { if nm, found := s.netmaps[epoch]; found { return nm, nil } return nil, fmt.Errorf("netmap not found") } func (s *testNetmapSource) Epoch() (uint64, error) { return s.currentEpoch, nil }