7c02a2e251
- Update `neofs-sdk-go`: v0.0.0-20211230072947-1fe37df88f80 => v0.0.0-20220113123743-7f3162110659 - Add client interface that duplicates SDK's client behaviour and new `MultiAddressClient` interface that has method that iterates over wrapped clients. - Also start using simple client mode that does not require parsing statuses outside the SDK library. Signed-off-by: Pavel Karpy <carpawell@nspcc.ru>
91 lines
3 KiB
Go
91 lines
3 KiB
Go
package common
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/core/client"
|
|
"github.com/nspcc-dev/neofs-node/pkg/core/netmap"
|
|
reputationcommon "github.com/nspcc-dev/neofs-node/pkg/services/reputation/common"
|
|
reputationrouter "github.com/nspcc-dev/neofs-node/pkg/services/reputation/common/router"
|
|
trustcontroller "github.com/nspcc-dev/neofs-node/pkg/services/reputation/local/controller"
|
|
)
|
|
|
|
type clientCache interface {
|
|
Get(client.NodeInfo) (client.Client, error)
|
|
}
|
|
|
|
// clientKeyRemoteProvider must provide remote writer and take into account
|
|
// that requests must be sent via passed api client and must be signed with
|
|
// passed private key.
|
|
type clientKeyRemoteProvider interface {
|
|
WithClient(client.Client) reputationcommon.WriterProvider
|
|
}
|
|
|
|
// remoteTrustProvider is implementation of reputation RemoteWriterProvider interface.
|
|
// It caches clients, checks if it is the end of the route and checks either current
|
|
// node is remote target or not.
|
|
//
|
|
// remoteTrustProvider requires to be provided with clientKeyRemoteProvider.
|
|
type remoteTrustProvider struct {
|
|
netmapKeys netmap.AnnouncedKeys
|
|
deadEndProvider reputationcommon.WriterProvider
|
|
clientCache clientCache
|
|
remoteProvider clientKeyRemoteProvider
|
|
}
|
|
|
|
// RemoteProviderPrm groups the required parameters of the remoteTrustProvider's constructor.
|
|
//
|
|
// All values must comply with the requirements imposed on them.
|
|
// Passing incorrect parameter values will result in constructor
|
|
// failure (error or panic depending on the implementation).
|
|
type RemoteProviderPrm struct {
|
|
NetmapKeys netmap.AnnouncedKeys
|
|
DeadEndProvider reputationcommon.WriterProvider
|
|
ClientCache clientCache
|
|
WriterProvider clientKeyRemoteProvider
|
|
}
|
|
|
|
func NewRemoteTrustProvider(prm RemoteProviderPrm) reputationrouter.RemoteWriterProvider {
|
|
switch {
|
|
case prm.NetmapKeys == nil:
|
|
PanicOnPrmValue("NetmapKeys", prm.NetmapKeys)
|
|
case prm.DeadEndProvider == nil:
|
|
PanicOnPrmValue("DeadEndProvider", prm.DeadEndProvider)
|
|
case prm.ClientCache == nil:
|
|
PanicOnPrmValue("ClientCache", prm.ClientCache)
|
|
case prm.WriterProvider == nil:
|
|
PanicOnPrmValue("WriterProvider", prm.WriterProvider)
|
|
}
|
|
|
|
return &remoteTrustProvider{
|
|
netmapKeys: prm.NetmapKeys,
|
|
deadEndProvider: prm.DeadEndProvider,
|
|
clientCache: prm.ClientCache,
|
|
remoteProvider: prm.WriterProvider,
|
|
}
|
|
}
|
|
|
|
func (rtp *remoteTrustProvider) InitRemote(srv reputationcommon.ServerInfo) (reputationcommon.WriterProvider, error) {
|
|
if srv == nil {
|
|
return rtp.deadEndProvider, nil
|
|
}
|
|
|
|
if rtp.netmapKeys.IsLocalKey(srv.PublicKey()) {
|
|
// if local => return no-op writer
|
|
return trustcontroller.SimpleWriterProvider(new(NopReputationWriter)), nil
|
|
}
|
|
|
|
var info client.NodeInfo
|
|
|
|
err := client.NodeInfoFromRawNetmapElement(&info, srv)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("parse client node info: %w", err)
|
|
}
|
|
|
|
c, err := rtp.clientCache.Get(info)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not initialize API client: %w", err)
|
|
}
|
|
|
|
return rtp.remoteProvider.WithClient(c), nil
|
|
}
|