frostfs-node/pkg/services/object/common/target/validation.go
Airat Arifullin 90cf89b26c
All checks were successful
DCO action / DCO (pull_request) Successful in 5m1s
Tests and linters / Run gofumpt (pull_request) Successful in 5m31s
Pre-commit hooks / Pre-commit (pull_request) Successful in 5m54s
Vulncheck / Vulncheck (pull_request) Successful in 5m39s
Build / Build Components (1.22) (pull_request) Successful in 6m6s
Build / Build Components (1.23) (pull_request) Successful in 6m7s
Tests and linters / Tests (1.22) (pull_request) Successful in 6m0s
Tests and linters / Tests (1.23) (pull_request) Successful in 6m9s
Tests and linters / Staticcheck (pull_request) Successful in 6m9s
Tests and linters / Lint (pull_request) Successful in 6m19s
Tests and linters / Tests with -race (pull_request) Successful in 6m33s
Tests and linters / gopls check (pull_request) Successful in 6m46s
[#1310] object: Move target initialization to separate package
* Split the logic of write target initialization to different packages;
* Refactor patch and put services: since both service initialize the target
  themselves.

Signed-off-by: Airat Arifullin <a.arifullin@yadro.com>
2024-09-04 10:21:10 +03:00

139 lines
3.4 KiB
Go

package writetarget
import (
"bytes"
"context"
"crypto/sha256"
"errors"
"fmt"
"hash"
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/object"
commonerrors "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object/common/errors"
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/checksum"
objectSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object"
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/transformer"
"git.frostfs.info/TrueCloudLab/tzhash/tz"
)
// validatingTarget validates unprepared object format and content (streaming PUT case).
type validatingTarget struct {
nextTarget transformer.ChunkedObjectWriter
fmt *object.FormatValidator
}
// validatingPreparedTarget validates prepared object format and content.
type validatingPreparedTarget struct {
nextTarget transformer.ChunkedObjectWriter
fmt *object.FormatValidator
hash hash.Hash
checksum []byte
maxPayloadSz uint64 // network config
payloadSz uint64 // payload size of the streaming object from header
writtenPayload uint64 // number of already written payload bytes
}
func (t *validatingTarget) WriteHeader(ctx context.Context, obj *objectSDK.Object) error {
if err := t.fmt.Validate(ctx, obj, true); err != nil {
return fmt.Errorf("(%T) could not validate object format: %w", t, err)
}
return t.nextTarget.WriteHeader(ctx, obj)
}
func (t *validatingTarget) Write(ctx context.Context, p []byte) (n int, err error) {
return t.nextTarget.Write(ctx, p)
}
func (t *validatingTarget) Close(ctx context.Context) (*transformer.AccessIdentifiers, error) {
return t.nextTarget.Close(ctx)
}
func (t *validatingPreparedTarget) WriteHeader(ctx context.Context, obj *objectSDK.Object) error {
t.payloadSz = obj.PayloadSize()
chunkLn := uint64(len(obj.Payload()))
// check chunk size
if chunkLn > t.payloadSz {
return commonerrors.ErrWrongPayloadSize
}
// check payload size limit
if t.payloadSz > t.maxPayloadSz {
return commonerrors.ErrExceedingMaxSize
}
cs, csSet := obj.PayloadChecksum()
if !csSet {
return errors.New("missing payload checksum")
}
switch typ := cs.Type(); typ {
default:
return fmt.Errorf("(%T) unsupported payload checksum type %v", t, typ)
case checksum.SHA256:
t.hash = sha256.New()
case checksum.TZ:
t.hash = tz.New()
}
t.checksum = cs.Value()
if err := t.fmt.Validate(ctx, obj, false); err != nil {
return fmt.Errorf("(%T) could not validate object format: %w", t, err)
}
err := t.nextTarget.WriteHeader(ctx, obj)
if err != nil {
return err
}
// update written bytes
//
// Note: we MUST NOT add obj.PayloadSize() since obj
// can carry only the chunk of the full payload
t.writtenPayload += chunkLn
return nil
}
func (t *validatingPreparedTarget) Write(ctx context.Context, p []byte) (n int, err error) {
chunkLn := uint64(len(p))
// check if new chunk will overflow payload size
if t.writtenPayload+chunkLn > t.payloadSz {
return 0, commonerrors.ErrWrongPayloadSize
}
_, err = t.hash.Write(p)
if err != nil {
return
}
n, err = t.nextTarget.Write(ctx, p)
if err == nil {
t.writtenPayload += uint64(n)
}
return
}
func (t *validatingPreparedTarget) Close(ctx context.Context) (*transformer.AccessIdentifiers, error) {
// check payload size correctness
if t.payloadSz != t.writtenPayload {
return nil, commonerrors.ErrWrongPayloadSize
}
if !bytes.Equal(t.hash.Sum(nil), t.checksum) {
return nil, fmt.Errorf("(%T) incorrect payload checksum", t)
}
return t.nextTarget.Close(ctx)
}