forked from TrueCloudLab/frostfs-node
[#460] reputation/local: Implement dependencies
Implement dependencies for local trust router in `main` package. Managers are defined as next node after the current one in HRW sorted list of current NetMap. Signed-off-by: Pavel Karpy <carpawell@nspcc.ru>
This commit is contained in:
parent
5970a5e6ae
commit
39f55611c6
1 changed files with 193 additions and 28 deletions
|
@ -3,17 +3,26 @@ package main
|
|||
import (
|
||||
"bytes"
|
||||
"context"
|
||||
"crypto/ecdsa"
|
||||
"encoding/hex"
|
||||
|
||||
"github.com/nspcc-dev/hrw"
|
||||
apiClient "github.com/nspcc-dev/neofs-api-go/pkg/client"
|
||||
apiNetmap "github.com/nspcc-dev/neofs-api-go/pkg/netmap"
|
||||
reputationapi "github.com/nspcc-dev/neofs-api-go/pkg/reputation"
|
||||
v2reputation "github.com/nspcc-dev/neofs-api-go/v2/reputation"
|
||||
v2reputationgrpc "github.com/nspcc-dev/neofs-api-go/v2/reputation/grpc"
|
||||
crypto "github.com/nspcc-dev/neofs-crypto"
|
||||
netmapcore "github.com/nspcc-dev/neofs-node/pkg/core/netmap"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/morph/event"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/morph/event/netmap"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/network"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/network/cache"
|
||||
grpcreputation "github.com/nspcc-dev/neofs-node/pkg/network/transport/reputation/grpc"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/services/reputation"
|
||||
trustcontroller "github.com/nspcc-dev/neofs-node/pkg/services/reputation/local/controller"
|
||||
reputationroute "github.com/nspcc-dev/neofs-node/pkg/services/reputation/local/route"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/services/reputation/local/route/managers"
|
||||
truststorage "github.com/nspcc-dev/neofs-node/pkg/services/reputation/local/storage"
|
||||
reputationrpc "github.com/nspcc-dev/neofs-node/pkg/services/reputation/rpc"
|
||||
"github.com/nspcc-dev/neofs-node/pkg/util/logger"
|
||||
|
@ -39,6 +48,159 @@ type localTrustIterator struct {
|
|||
epochStorage *truststorage.EpochTrustValueStorage
|
||||
}
|
||||
|
||||
type managerBuilder struct {
|
||||
log *logger.Logger
|
||||
nmSrc netmapcore.Source
|
||||
}
|
||||
|
||||
type remoteLocalTrustProvider struct {
|
||||
localAddrSrc network.LocalAddressSource
|
||||
deadEndProvider trustcontroller.WriterProvider
|
||||
key *ecdsa.PrivateKey
|
||||
|
||||
clientCache interface {
|
||||
Get(string) (apiClient.Client, error)
|
||||
}
|
||||
}
|
||||
|
||||
type nopReputationWriter struct{}
|
||||
|
||||
func (nopReputationWriter) Write(reputation.Trust) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (nopReputationWriter) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
type remoteLocalTrustWriter struct {
|
||||
ctx trustcontroller.Context
|
||||
client apiClient.Client
|
||||
key *ecdsa.PrivateKey
|
||||
|
||||
buf []*reputationapi.Trust
|
||||
}
|
||||
|
||||
func (rtp *remoteLocalTrustWriter) Write(t reputation.Trust) error {
|
||||
apiTrust := reputationapi.NewTrust()
|
||||
|
||||
apiPeer := reputationapi.NewPeerID()
|
||||
apiPeer.SetPublicKey(t.Peer())
|
||||
|
||||
apiTrust.SetValue(t.Value().Float64())
|
||||
apiTrust.SetPeer(apiPeer)
|
||||
|
||||
rtp.buf = append(rtp.buf, apiTrust)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (rtp *remoteLocalTrustWriter) Close() error {
|
||||
prm := apiClient.SendLocalTrustPrm{}
|
||||
|
||||
prm.SetEpoch(rtp.ctx.Epoch())
|
||||
prm.SetTrusts(rtp.buf)
|
||||
|
||||
_, err := rtp.client.SendLocalTrust(
|
||||
rtp.ctx,
|
||||
prm,
|
||||
apiClient.WithKey(rtp.key),
|
||||
)
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
type remoteLocalTrustWriterProvider struct {
|
||||
client apiClient.Client
|
||||
key *ecdsa.PrivateKey
|
||||
}
|
||||
|
||||
type localTrustLogger struct {
|
||||
ctx trustcontroller.Context
|
||||
|
||||
log *logger.Logger
|
||||
}
|
||||
|
||||
func (l *localTrustLogger) Write(t reputation.Trust) error {
|
||||
l.log.Info("new local trust",
|
||||
zap.Uint64("epoch", l.ctx.Epoch()),
|
||||
zap.String("peer", hex.EncodeToString(t.Peer().Bytes())),
|
||||
zap.Stringer("value", t.Value()),
|
||||
)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (*localTrustLogger) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (rtwp *remoteLocalTrustWriterProvider) InitWriter(ctx trustcontroller.Context) (trustcontroller.Writer, error) {
|
||||
return &remoteLocalTrustWriter{
|
||||
ctx: ctx,
|
||||
client: rtwp.client,
|
||||
key: rtwp.key,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (rtp *remoteLocalTrustProvider) InitRemote(srv reputationroute.ServerInfo) (trustcontroller.WriterProvider, error) {
|
||||
if srv == nil {
|
||||
return rtp.deadEndProvider, nil
|
||||
}
|
||||
|
||||
addr := srv.Address()
|
||||
|
||||
if rtp.localAddrSrc.LocalAddress().String() == srv.Address() {
|
||||
// if local => return no-op writer
|
||||
return trustcontroller.SimpleWriterProvider(new(nopReputationWriter)), nil
|
||||
}
|
||||
|
||||
ipAddr, err := network.IPAddrFromMultiaddr(addr)
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "could not convert address to IP format")
|
||||
}
|
||||
|
||||
c, err := rtp.clientCache.Get(ipAddr)
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "could not initialize API client")
|
||||
}
|
||||
|
||||
return &remoteLocalTrustWriterProvider{
|
||||
client: c,
|
||||
key: rtp.key,
|
||||
}, nil
|
||||
}
|
||||
|
||||
// BuildManagers sorts nodes in NetMap with HRW algorithms and
|
||||
// takes the next node after the current one as the only manager.
|
||||
func (mb *managerBuilder) BuildManagers(epoch uint64, p reputation.PeerID) ([]reputationroute.ServerInfo, error) {
|
||||
nm, err := mb.nmSrc.GetNetMapByEpoch(epoch)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// make a copy to keep order consistency of the origin netmap after sorting
|
||||
nodes := make([]*apiNetmap.Node, len(nm.Nodes))
|
||||
|
||||
copy(nodes, nm.Nodes)
|
||||
|
||||
hrw.SortSliceByValue(nodes, epoch)
|
||||
|
||||
for i := range nodes {
|
||||
if bytes.Equal(nodes[i].PublicKey(), p.Bytes()) {
|
||||
managerIndex := i + 1
|
||||
|
||||
if managerIndex == len(nodes) {
|
||||
managerIndex = 0
|
||||
}
|
||||
|
||||
return []reputationroute.ServerInfo{nodes[managerIndex]}, nil
|
||||
}
|
||||
}
|
||||
|
||||
return nil, nil
|
||||
}
|
||||
|
||||
func (s *localTrustStorage) InitIterator(ctx trustcontroller.Context) (trustcontroller.Iterator, error) {
|
||||
epochStorage, err := s.storage.DataForEpoch(ctx.Epoch())
|
||||
if err != nil && !errors.Is(err, truststorage.ErrNoPositiveTrust) {
|
||||
|
@ -52,6 +214,13 @@ func (s *localTrustStorage) InitIterator(ctx trustcontroller.Context) (trustcont
|
|||
}, nil
|
||||
}
|
||||
|
||||
func (s *localTrustStorage) InitWriter(ctx trustcontroller.Context) (trustcontroller.Writer, error) {
|
||||
return &localTrustLogger{
|
||||
ctx: ctx,
|
||||
log: s.log,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (it *localTrustIterator) Iterate(h reputation.TrustHandler) error {
|
||||
if it.epochStorage != nil {
|
||||
err := it.epochStorage.Iterate(h)
|
||||
|
@ -99,33 +268,6 @@ func (it *localTrustIterator) Iterate(h reputation.TrustHandler) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
func (s *localTrustStorage) InitWriter(ctx trustcontroller.Context) (trustcontroller.Writer, error) {
|
||||
return &localTrustLogger{
|
||||
ctx: ctx,
|
||||
log: s.log,
|
||||
}, nil
|
||||
}
|
||||
|
||||
type localTrustLogger struct {
|
||||
ctx trustcontroller.Context
|
||||
|
||||
log *logger.Logger
|
||||
}
|
||||
|
||||
func (l *localTrustLogger) Write(t reputation.Trust) error {
|
||||
l.log.Info("new local trust",
|
||||
zap.Uint64("epoch", l.ctx.Epoch()),
|
||||
zap.String("peer", hex.EncodeToString(t.Peer().Bytes())),
|
||||
zap.Stringer("value", t.Value()),
|
||||
)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (*localTrustLogger) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func initReputationService(c *cfg) {
|
||||
// consider sharing this between application components
|
||||
nmSrc := newCachedNetmapStorage(c.cfgNetmap.state, c.cfgNetmap.wrapper)
|
||||
|
@ -139,9 +281,32 @@ func initReputationService(c *cfg) {
|
|||
localKey: crypto.MarshalPublicKey(&c.key.PublicKey),
|
||||
}
|
||||
|
||||
managerBuilder := &managerBuilder{
|
||||
log: c.log,
|
||||
nmSrc: nmSrc,
|
||||
}
|
||||
|
||||
routeBuilder := managers.New(managers.Prm{
|
||||
ManagerBuilder: managerBuilder,
|
||||
})
|
||||
|
||||
remoteLocalTrustProvider := &remoteLocalTrustProvider{
|
||||
localAddrSrc: c,
|
||||
deadEndProvider: trustStorage,
|
||||
clientCache: cache.NewSDKClientCache(),
|
||||
key: c.key,
|
||||
}
|
||||
|
||||
router := reputationroute.New(
|
||||
reputationroute.Prm{
|
||||
LocalServerInfo: c,
|
||||
RemoteWriterProvider: remoteLocalTrustProvider,
|
||||
Builder: routeBuilder,
|
||||
})
|
||||
|
||||
c.cfgReputation.localTrustCtrl = trustcontroller.New(trustcontroller.Prm{
|
||||
LocalTrustSource: trustStorage,
|
||||
LocalTrustTarget: trustStorage,
|
||||
LocalTrustTarget: router,
|
||||
})
|
||||
|
||||
addNewEpochNotificationHandler(c, func(ev event.Event) {
|
||||
|
|
Loading…
Reference in a new issue