[#1556] Upgrade NeoFS SDK Go with changed container API

Signed-off-by: Leonard Lyubich <leonard@nspcc.ru>
This commit is contained in:
Leonard Lyubich 2022-06-28 10:01:05 +03:00 committed by LeL
parent f699e82ea7
commit c165d1a9b5
36 changed files with 203 additions and 476 deletions

View file

@ -123,7 +123,7 @@ type GetContainerRes struct {
} }
// Container returns structured of the requested container. // Container returns structured of the requested container.
func (x GetContainerRes) Container() *container.Container { func (x GetContainerRes) Container() container.Container {
return x.cliRes.Container() return x.cliRes.Container()
} }

View file

@ -4,11 +4,9 @@ import (
"errors" "errors"
"fmt" "fmt"
"os" "os"
"strconv"
"strings" "strings"
"time" "time"
"github.com/google/uuid"
internalclient "github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/client" internalclient "github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/client"
"github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/common" "github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/common"
"github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/commonflags" "github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/commonflags"
@ -19,13 +17,11 @@ import (
"github.com/nspcc-dev/neofs-sdk-go/session" "github.com/nspcc-dev/neofs-sdk-go/session"
subnetid "github.com/nspcc-dev/neofs-sdk-go/subnet/id" subnetid "github.com/nspcc-dev/neofs-sdk-go/subnet/id"
"github.com/nspcc-dev/neofs-sdk-go/user" "github.com/nspcc-dev/neofs-sdk-go/user"
versionSDK "github.com/nspcc-dev/neofs-sdk-go/version"
"github.com/spf13/cobra" "github.com/spf13/cobra"
) )
var ( var (
containerACL string containerACL string
containerNonce string
containerPolicy string containerPolicy string
containerAttributes []string containerAttributes []string
containerAwait bool containerAwait bool
@ -52,18 +48,17 @@ It will be stored in sidechain when inner ring will accepts it.`,
placementPolicy.RestrictSubnet(subnetID) placementPolicy.RestrictSubnet(subnetID)
} }
attributes, err := parseAttributes(containerAttributes) var cnr container.Container
cnr.Init()
err = parseAttributes(&cnr, containerAttributes)
common.ExitOnErr(cmd, "", err) common.ExitOnErr(cmd, "", err)
var basicACL acl.Basic var basicACL acl.Basic
common.ExitOnErr(cmd, "decode basic ACL string: %w", basicACL.DecodeString(containerACL)) common.ExitOnErr(cmd, "decode basic ACL string: %w", basicACL.DecodeString(containerACL))
nonce, err := parseNonce(containerNonce)
common.ExitOnErr(cmd, "", err)
key := key.GetOrGenerate(cmd) key := key.GetOrGenerate(cmd)
cnr := container.New()
var tok *session.Container var tok *session.Container
sessionTokenPath, _ := cmd.Flags().GetString(commonflags.SessionToken) sessionTokenPath, _ := cmd.Flags().GetString(commonflags.SessionToken)
@ -72,27 +67,22 @@ It will be stored in sidechain when inner ring will accepts it.`,
common.ReadSessionToken(cmd, tok, sessionTokenPath) common.ReadSessionToken(cmd, tok, sessionTokenPath)
issuer := tok.Issuer() issuer := tok.Issuer()
cnr.SetOwnerID(&issuer) cnr.SetOwner(issuer)
} else { } else {
var idOwner user.ID var idOwner user.ID
user.IDFromKey(&idOwner, key.PublicKey) user.IDFromKey(&idOwner, key.PublicKey)
cnr.SetOwnerID(&idOwner) cnr.SetOwner(idOwner)
} }
ver := versionSDK.Current() cnr.SetPlacementPolicy(*placementPolicy)
cnr.SetVersion(&ver)
cnr.SetPlacementPolicy(placementPolicy)
cnr.SetBasicACL(basicACL) cnr.SetBasicACL(basicACL)
cnr.SetAttributes(attributes)
cnr.SetNonceUUID(nonce)
cli := internalclient.GetSDKClientByFlag(cmd, key, commonflags.RPC) cli := internalclient.GetSDKClientByFlag(cmd, key, commonflags.RPC)
var putPrm internalclient.PutContainerPrm var putPrm internalclient.PutContainerPrm
putPrm.SetClient(cli) putPrm.SetClient(cli)
putPrm.SetContainer(*cnr) putPrm.SetContainer(cnr)
if tok != nil { if tok != nil {
putPrm.WithinSession(*tok) putPrm.WithinSession(*tok)
@ -137,7 +127,6 @@ func initContainerCreateCmd() {
)) ))
flags.StringVarP(&containerPolicy, "policy", "p", "", "QL-encoded or JSON-encoded placement policy or path to file with it") flags.StringVarP(&containerPolicy, "policy", "p", "", "QL-encoded or JSON-encoded placement policy or path to file with it")
flags.StringSliceVarP(&containerAttributes, "attributes", "a", nil, "comma separated pairs of container attributes in form of Key1=Value1,Key2=Value2") flags.StringSliceVarP(&containerAttributes, "attributes", "a", nil, "comma separated pairs of container attributes in form of Key1=Value1,Key2=Value2")
flags.StringVarP(&containerNonce, "nonce", "n", "", "UUIDv4 nonce value for container")
flags.BoolVar(&containerAwait, "await", false, "block execution until container is persisted") flags.BoolVar(&containerAwait, "await", false, "block execution until container is persisted")
flags.StringVar(&containerName, "name", "", "container name attribute") flags.StringVar(&containerName, "name", "", "container name attribute")
flags.BoolVar(&containerNoTimestamp, "disable-timestamp", false, "disable timestamp container attribute") flags.BoolVar(&containerNoTimestamp, "disable-timestamp", false, "disable timestamp container attribute")
@ -173,48 +162,23 @@ func parseContainerPolicy(policyString string) (*netmap.PlacementPolicy, error)
return nil, errors.New("can't parse placement policy") return nil, errors.New("can't parse placement policy")
} }
func parseAttributes(attributes []string) ([]container.Attribute, error) { func parseAttributes(dst *container.Container, attributes []string) error {
result := make([]container.Attribute, len(attributes), len(attributes)+2) // name + timestamp attributes
for i := range attributes { for i := range attributes {
kvPair := strings.Split(attributes[i], attributeDelimiter) kvPair := strings.Split(attributes[i], attributeDelimiter)
if len(kvPair) != 2 { if len(kvPair) != 2 {
return nil, errors.New("invalid container attribute") return errors.New("invalid container attribute")
} }
result[i].SetKey(kvPair[0]) dst.SetAttribute(kvPair[0], kvPair[1])
result[i].SetValue(kvPair[1])
} }
if !containerNoTimestamp { if !containerNoTimestamp {
index := len(result) container.SetCreationTime(dst, time.Now())
result = append(result, container.Attribute{})
result[index].SetKey(container.AttributeTimestamp)
result[index].SetValue(strconv.FormatInt(time.Now().Unix(), 10))
} }
if containerName != "" { if containerName != "" {
index := len(result) container.SetName(dst, containerName)
result = append(result, container.Attribute{})
result[index].SetKey(container.AttributeName)
result[index].SetValue(containerName)
} }
return result, nil return nil
}
func parseNonce(nonce string) (uuid.UUID, error) {
if nonce == "" {
result := uuid.New()
common.PrintVerbose("Generating container nonce: %s", result)
return result, nil
}
uid, err := uuid.Parse(nonce)
if err != nil {
return uuid.UUID{}, fmt.Errorf("could not parse nonce: %w", err)
}
return uid, nil
} }

View file

@ -11,6 +11,7 @@ import (
"github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/key" "github.com/nspcc-dev/neofs-node/cmd/neofs-cli/internal/key"
"github.com/nspcc-dev/neofs-sdk-go/container" "github.com/nspcc-dev/neofs-sdk-go/container"
"github.com/nspcc-dev/neofs-sdk-go/container/acl" "github.com/nspcc-dev/neofs-sdk-go/container/acl"
cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
"github.com/spf13/cobra" "github.com/spf13/cobra"
) )
@ -26,13 +27,12 @@ var getContainerInfoCmd = &cobra.Command{
Short: "Get container field info", Short: "Get container field info",
Long: `Get container field info`, Long: `Get container field info`,
Run: func(cmd *cobra.Command, args []string) { Run: func(cmd *cobra.Command, args []string) {
var cnr *container.Container var cnr container.Container
if containerPathFrom != "" { if containerPathFrom != "" {
data, err := os.ReadFile(containerPathFrom) data, err := os.ReadFile(containerPathFrom)
common.ExitOnErr(cmd, "can't read file: %w", err) common.ExitOnErr(cmd, "can't read file: %w", err)
cnr = container.New()
err = cnr.Unmarshal(data) err = cnr.Unmarshal(data)
common.ExitOnErr(cmd, "can't unmarshal container: %w", err) common.ExitOnErr(cmd, "can't unmarshal container: %w", err)
} else { } else {
@ -62,8 +62,7 @@ var getContainerInfoCmd = &cobra.Command{
data, err = cnr.MarshalJSON() data, err = cnr.MarshalJSON()
common.ExitOnErr(cmd, "can't JSON encode container: %w", err) common.ExitOnErr(cmd, "can't JSON encode container: %w", err)
} else { } else {
data, err = cnr.Marshal() data = cnr.Marshal()
common.ExitOnErr(cmd, "can't binary encode container: %w", err)
} }
err = os.WriteFile(containerPathTo, data, 0644) err = os.WriteFile(containerPathTo, data, 0644)
@ -90,11 +89,7 @@ func (x *stringWriter) WriteString(s string) (n int, err error) {
return len(s), nil return len(s), nil
} }
func prettyPrintContainer(cmd *cobra.Command, cnr *container.Container, jsonEncoding bool) { func prettyPrintContainer(cmd *cobra.Command, cnr container.Container, jsonEncoding bool) {
if cnr == nil {
return
}
if jsonEncoding { if jsonEncoding {
data, err := cnr.MarshalJSON() data, err := cnr.MarshalJSON()
if err != nil { if err != nil {
@ -111,45 +106,25 @@ func prettyPrintContainer(cmd *cobra.Command, cnr *container.Container, jsonEnco
return return
} }
id := container.CalculateID(cnr) var id cid.ID
container.CalculateID(&id, cnr)
cmd.Println("container ID:", id) cmd.Println("container ID:", id)
v := cnr.Version() cmd.Println("owner ID:", cnr.Owner())
cmd.Printf("version: %d.%d\n", v.Major(), v.Minor())
cmd.Println("owner ID:", cnr.OwnerID())
basicACL := cnr.BasicACL() basicACL := cnr.BasicACL()
prettyPrintBasicACL(cmd, basicACL) prettyPrintBasicACL(cmd, basicACL)
for _, attribute := range cnr.Attributes() { cmd.Println("created:", container.CreatedAt(cnr))
if attribute.Key() == container.AttributeTimestamp {
cmd.Printf("attribute: %s=%s (%s)\n",
attribute.Key(),
attribute.Value(),
common.PrettyPrintUnixTime(attribute.Value()))
continue cmd.Println("attributes:")
} cnr.IterateAttributes(func(key, val string) {
cmd.Printf("\t%s=%s\n", key, val)
})
cmd.Printf("attribute: %s=%s\n", attribute.Key(), attribute.Value())
}
nonce, err := cnr.NonceUUID()
if err == nil {
cmd.Println("nonce:", nonce)
} else {
cmd.Println("invalid nonce:", err)
}
pp := cnr.PlacementPolicy()
if pp == nil {
cmd.Println("missing placement policy")
} else {
cmd.Println("placement policy:") cmd.Println("placement policy:")
common.ExitOnErr(cmd, "write policy: %w", pp.WriteStringTo((*stringWriter)(cmd))) common.ExitOnErr(cmd, "write policy: %w", cnr.PlacementPolicy().WriteStringTo((*stringWriter)(cmd)))
cmd.Println() cmd.Println()
}
} }
func prettyPrintBasicACL(cmd *cobra.Command, basicACL acl.Basic) { func prettyPrintBasicACL(cmd *cobra.Command, basicACL acl.Basic) {

View file

@ -213,16 +213,11 @@ type morphLoadWriter struct {
key []byte key []byte
} }
func (w *morphLoadWriter) Put(a containerSDK.UsedSpaceAnnouncement) error { func (w *morphLoadWriter) Put(a containerSDK.SizeEstimation) error {
cnr, ok := a.ContainerID()
if !ok {
return errors.New("missing container ID in load announcement")
}
w.log.Debug("save used space announcement in contract", w.log.Debug("save used space announcement in contract",
zap.Uint64("epoch", a.Epoch()), zap.Uint64("epoch", a.Epoch()),
zap.Stringer("cid", cnr), zap.Stringer("cid", a.Container()),
zap.Uint64("size", a.UsedSpace()), zap.Uint64("size", a.Value()),
) )
prm := cntClient.AnnounceLoadPrm{} prm := cntClient.AnnounceLoadPrm{}
@ -239,7 +234,7 @@ func (*morphLoadWriter) Close() error {
type nopLoadWriter struct{} type nopLoadWriter struct{}
func (nopLoadWriter) Put(containerSDK.UsedSpaceAnnouncement) error { func (nopLoadWriter) Put(containerSDK.SizeEstimation) error {
return nil return nil
} }
@ -302,10 +297,10 @@ type remoteLoadAnnounceWriter struct {
client client.Client client client.Client
buf []containerSDK.UsedSpaceAnnouncement buf []containerSDK.SizeEstimation
} }
func (r *remoteLoadAnnounceWriter) Put(a containerSDK.UsedSpaceAnnouncement) error { func (r *remoteLoadAnnounceWriter) Put(a containerSDK.SizeEstimation) error {
r.buf = append(r.buf, a) r.buf = append(r.buf, a)
return nil return nil
@ -354,11 +349,6 @@ func (l *loadPlacementBuilder) buildPlacement(epoch uint64, idCnr cid.ID) ([][]n
return nil, nil, err return nil, nil, err
} }
policy := cnr.Value.PlacementPolicy()
if policy == nil {
return nil, nil, errors.New("missing placement policy in container")
}
nm, err := l.nmSrc.GetNetMapByEpoch(epoch) nm, err := l.nmSrc.GetNetMapByEpoch(epoch)
if err != nil { if err != nil {
return nil, nil, fmt.Errorf("could not get network map: %w", err) return nil, nil, fmt.Errorf("could not get network map: %w", err)
@ -367,7 +357,7 @@ func (l *loadPlacementBuilder) buildPlacement(epoch uint64, idCnr cid.ID) ([][]n
binCnr := make([]byte, sha256.Size) binCnr := make([]byte, sha256.Size)
idCnr.Encode(binCnr) idCnr.Encode(binCnr)
cnrNodes, err := nm.ContainerNodes(*policy, binCnr) cnrNodes, err := nm.ContainerNodes(cnr.Value.PlacementPolicy(), binCnr)
if err != nil { if err != nil {
return nil, nil, fmt.Errorf("could not build container nodes: %w", err) return nil, nil, fmt.Errorf("could not build container nodes: %w", err)
} }
@ -403,15 +393,15 @@ func (d *localStorageLoad) Iterate(f loadcontroller.UsedSpaceFilter, h loadcontr
zap.Stringer("cid", idList[i]), zap.Stringer("cid", idList[i]),
) )
a := containerSDK.NewAnnouncement() var a containerSDK.SizeEstimation
a.SetContainerID(idList[i]) a.SetContainer(idList[i])
a.SetUsedSpace(sz) a.SetValue(sz)
if f != nil && !f(*a) { if f != nil && !f(a) {
continue continue
} }
if err := h(*a); err != nil { if err := h(a); err != nil {
return err return err
} }
} }
@ -479,8 +469,15 @@ func (c *usedSpaceService) AnnounceUsedSpace(ctx context.Context, req *container
return nil, fmt.Errorf("could not initialize container's used space writer: %w", err) return nil, fmt.Errorf("could not initialize container's used space writer: %w", err)
} }
var est containerSDK.SizeEstimation
for _, aV2 := range req.GetBody().GetAnnouncements() { for _, aV2 := range req.GetBody().GetAnnouncements() {
if err := c.processLoadValue(ctx, *containerSDK.NewAnnouncementFromV2(&aV2), passedRoute, w); err != nil { err = est.ReadFromV2(aV2)
if err != nil {
return nil, fmt.Errorf("invalid size announcement: %w", err)
}
if err := c.processLoadValue(ctx, est, passedRoute, w); err != nil {
return nil, err return nil, err
} }
} }
@ -527,14 +524,9 @@ func (l *loadPlacementBuilder) isNodeFromContainerKey(epoch uint64, cnr cid.ID,
return false, nil return false, nil
} }
func (c *usedSpaceService) processLoadValue(_ context.Context, a containerSDK.UsedSpaceAnnouncement, func (c *usedSpaceService) processLoadValue(_ context.Context, a containerSDK.SizeEstimation,
route []loadroute.ServerInfo, w loadcontroller.Writer) error { route []loadroute.ServerInfo, w loadcontroller.Writer) error {
cnr, ok := a.ContainerID() fromCnr, err := c.loadPlacementBuilder.isNodeFromContainerKey(a.Epoch(), a.Container(), route[0].PublicKey())
if !ok {
return errors.New("missing container ID in load announcement")
}
fromCnr, err := c.loadPlacementBuilder.isNodeFromContainerKey(a.Epoch(), cnr, route[0].PublicKey())
if err != nil { if err != nil {
return fmt.Errorf("could not verify that the sender belongs to the container: %w", err) return fmt.Errorf("could not verify that the sender belongs to the container: %w", err)
} else if !fromCnr { } else if !fromCnr {
@ -591,13 +583,8 @@ func (m morphContainerWriter) Put(cnr containerCore.Container) (*cid.ID, error)
return nil, err return nil, err
} }
idOwner := cnr.Value.OwnerID()
if idOwner == nil {
return nil, errors.New("missing container owner")
}
if m.cacheEnabled { if m.cacheEnabled {
m.lists.InvalidateContainerList(*idOwner) m.lists.InvalidateContainerList(cnr.Value.Owner())
} }
return containerID, nil return containerID, nil

4
go.mod
View file

@ -17,9 +17,9 @@ require (
github.com/nspcc-dev/hrw v1.0.9 github.com/nspcc-dev/hrw v1.0.9
github.com/nspcc-dev/neo-go v0.99.1-pre.0.20220609082921-2c9fb2044242 github.com/nspcc-dev/neo-go v0.99.1-pre.0.20220609082921-2c9fb2044242
github.com/nspcc-dev/neo-go/pkg/interop v0.0.0-20220601120906-3bec6657f5c5 // indirect github.com/nspcc-dev/neo-go/pkg/interop v0.0.0-20220601120906-3bec6657f5c5 // indirect
github.com/nspcc-dev/neofs-api-go/v2 v2.12.3-0.20220621170933-dd233c3fbc84 github.com/nspcc-dev/neofs-api-go/v2 v2.12.3-0.20220630100506-c6f7ab3ef1bf
github.com/nspcc-dev/neofs-contract v0.15.1 github.com/nspcc-dev/neofs-contract v0.15.1
github.com/nspcc-dev/neofs-sdk-go v1.0.0-rc.4.0.20220623080532-aa5ee1dcde1c github.com/nspcc-dev/neofs-sdk-go v1.0.0-rc.4.0.20220704082116-2ad89085a341
github.com/nspcc-dev/tzhash v1.5.2 github.com/nspcc-dev/tzhash v1.5.2
github.com/panjf2000/ants/v2 v2.4.0 github.com/panjf2000/ants/v2 v2.4.0
github.com/paulmach/orb v0.2.2 github.com/paulmach/orb v0.2.2

BIN
go.sum

Binary file not shown.

View file

@ -1,54 +0,0 @@
package container
import (
"errors"
"fmt"
"github.com/nspcc-dev/neofs-node/pkg/core/version"
"github.com/nspcc-dev/neofs-sdk-go/container"
)
var (
errNilPolicy = errors.New("placement policy is nil")
errRepeatedAttributes = errors.New("repeated attributes found")
errEmptyAttribute = errors.New("empty attribute found")
)
// CheckFormat conducts an initial check of the v2 container data.
//
// It is expected that if a container fails this test,
// it will not be approved by the inner ring.
func CheckFormat(c *container.Container) error {
if c.PlacementPolicy() == nil {
return errNilPolicy
}
if v := c.Version(); v == nil || !version.IsValid(*v) {
return fmt.Errorf("incorrect version %s", v)
}
if c.OwnerID() == nil {
return errors.New("missing owner")
}
if _, err := c.NonceUUID(); err != nil {
return fmt.Errorf("incorrect nonce: %w", err)
}
// check if there are repeated attributes
attrs := c.Attributes()
uniqueAttr := make(map[string]struct{}, len(attrs))
for _, attr := range attrs {
if _, exists := uniqueAttr[attr.Key()]; exists {
return errRepeatedAttributes
}
if attr.Value() == "" {
return errEmptyAttribute
}
uniqueAttr[attr.Key()] = struct{}{}
}
return nil
}

View file

@ -1,73 +0,0 @@
package container
import (
"testing"
"github.com/google/uuid"
"github.com/nspcc-dev/neofs-node/pkg/util/test"
"github.com/nspcc-dev/neofs-sdk-go/container"
netmaptest "github.com/nspcc-dev/neofs-sdk-go/netmap/test"
"github.com/nspcc-dev/neofs-sdk-go/user"
"github.com/nspcc-dev/neofs-sdk-go/version"
"github.com/stretchr/testify/require"
)
func TestCheckFormat(t *testing.T) {
c := container.New()
require.Error(t, CheckFormat(c))
policy := netmaptest.PlacementPolicy()
c.SetPlacementPolicy(&policy)
require.Error(t, CheckFormat(c))
ver := version.Current()
c.SetVersion(&ver)
require.Error(t, CheckFormat(c))
var idUser user.ID
user.IDFromKey(&idUser, test.DecodeKey(-1).PublicKey)
c.SetOwnerID(&idUser)
// set incorrect nonce
cV2 := c.ToV2()
cV2.SetNonce([]byte{1, 2, 3})
c = container.NewContainerFromV2(cV2)
require.Error(t, CheckFormat(c))
c.SetNonceUUID(uuid.New())
require.NoError(t, CheckFormat(c))
// set empty value attribute
var attr1 container.Attribute
attr1.SetKey("attr")
attrs := container.Attributes{attr1}
c.SetAttributes(attrs)
require.ErrorIs(t, CheckFormat(c), errEmptyAttribute)
// add same key attribute
var attr2 container.Attribute
attr2.SetKey(attr1.Key())
attr2.SetValue("val")
attrs[0].SetValue(attr2.Value())
attrs = append(attrs, attr2)
c.SetAttributes(attrs)
require.ErrorIs(t, CheckFormat(c), errRepeatedAttributes)
attrs[1].SetKey(attr1.Key() + "smth")
c.SetAttributes(attrs)
require.NoError(t, CheckFormat(c))
}

View file

@ -14,7 +14,7 @@ import (
// Container groups information about the NeoFS container stored in the NeoFS network. // Container groups information about the NeoFS container stored in the NeoFS network.
type Container struct { type Container struct {
// Container structure. // Container structure.
Value *container.Container Value container.Container
// Signature of the Value. // Signature of the Value.
Signature neofscrypto.Signature Signature neofscrypto.Signature

View file

@ -60,19 +60,10 @@ func (ap *Processor) processStartAudit(epoch uint64) {
continue continue
} }
policy := cnr.Value.PlacementPolicy()
if policy == nil {
log.Error("missing placement policy in container, ignore",
zap.Stringer("cid", containers[i]),
)
continue
}
containers[i].Encode(pivot) containers[i].Encode(pivot)
// find all container nodes for current epoch // find all container nodes for current epoch
nodes, err := nm.ContainerNodes(*policy, pivot) nodes, err := nm.ContainerNodes(cnr.Value.PlacementPolicy(), pivot)
if err != nil { if err != nil {
log.Info("can't build placement for container, ignore", log.Info("can't build placement for container, ignore",
zap.Stringer("cid", containers[i]), zap.Stringer("cid", containers[i]),

View file

@ -1,11 +1,9 @@
package container package container
import ( import (
"errors"
"fmt" "fmt"
"github.com/nspcc-dev/neo-go/pkg/network/payload" "github.com/nspcc-dev/neo-go/pkg/network/payload"
"github.com/nspcc-dev/neofs-node/pkg/core/container"
cntClient "github.com/nspcc-dev/neofs-node/pkg/morph/client/container" cntClient "github.com/nspcc-dev/neofs-node/pkg/morph/client/container"
morphsubnet "github.com/nspcc-dev/neofs-node/pkg/morph/client/subnet" morphsubnet "github.com/nspcc-dev/neofs-node/pkg/morph/client/subnet"
"github.com/nspcc-dev/neofs-node/pkg/morph/event" "github.com/nspcc-dev/neofs-node/pkg/morph/event"
@ -30,7 +28,7 @@ type putEvent interface {
type putContainerContext struct { type putContainerContext struct {
e putEvent e putEvent
name, zone string // from container structure d containerSDK.Domain
} }
// Process a new container from the user by checking the container sanity // Process a new container from the user by checking the container sanity
@ -59,21 +57,15 @@ func (cp *Processor) processContainerPut(put putEvent) {
func (cp *Processor) checkPutContainer(ctx *putContainerContext) error { func (cp *Processor) checkPutContainer(ctx *putContainerContext) error {
binCnr := ctx.e.Container() binCnr := ctx.e.Container()
var cnr containerSDK.Container
cnr := containerSDK.New()
err := cnr.Unmarshal(binCnr) err := cnr.Unmarshal(binCnr)
if err != nil { if err != nil {
return fmt.Errorf("invalid binary container: %w", err) return fmt.Errorf("invalid binary container: %w", err)
} }
ownerContainer := cnr.OwnerID()
if ownerContainer == nil {
return errors.New("missing container owner")
}
err = cp.verifySignature(signatureVerificationData{ err = cp.verifySignature(signatureVerificationData{
ownerContainer: *ownerContainer, ownerContainer: cnr.Owner(),
verb: session.VerbContainerPut, verb: session.VerbContainerPut,
binTokenSession: ctx.e.SessionToken(), binTokenSession: ctx.e.SessionToken(),
binPublicKey: ctx.e.PublicKey(), binPublicKey: ctx.e.PublicKey(),
@ -96,12 +88,6 @@ func (cp *Processor) checkPutContainer(ctx *putContainerContext) error {
return fmt.Errorf("NNS: %w", err) return fmt.Errorf("NNS: %w", err)
} }
// perform format check
err = container.CheckFormat(cnr)
if err != nil {
return fmt.Errorf("incorrect container format: %w", err)
}
return nil return nil
} }
@ -116,8 +102,8 @@ func (cp *Processor) approvePutContainer(ctx *putContainerContext) {
prm.SetKey(e.PublicKey()) prm.SetKey(e.PublicKey())
prm.SetSignature(e.Signature()) prm.SetSignature(e.Signature())
prm.SetToken(e.SessionToken()) prm.SetToken(e.SessionToken())
prm.SetName(ctx.name) prm.SetName(ctx.d.Name())
prm.SetZone(ctx.zone) prm.SetZone(ctx.d.Zone())
if nr := e.NotaryRequest(); nr != nil { if nr := e.NotaryRequest(); nr != nil {
// put event was received via Notary service // put event was received via Notary service
@ -169,13 +155,8 @@ func (cp *Processor) checkDeleteContainer(e *containerEvent.Delete) error {
return fmt.Errorf("could not receive the container: %w", err) return fmt.Errorf("could not receive the container: %w", err)
} }
ownerContainer := cnr.Value.OwnerID()
if ownerContainer == nil {
return errors.New("missing container owner")
}
err = cp.verifySignature(signatureVerificationData{ err = cp.verifySignature(signatureVerificationData{
ownerContainer: *ownerContainer, ownerContainer: cnr.Value.Owner(),
verb: session.VerbContainerDelete, verb: session.VerbContainerDelete,
idContainerSet: true, idContainerSet: true,
idContainer: idCnr, idContainer: idCnr,
@ -213,47 +194,37 @@ func (cp *Processor) approveDeleteContainer(e *containerEvent.Delete) {
} }
} }
func checkNNS(ctx *putContainerContext, cnr *containerSDK.Container) error { func checkNNS(ctx *putContainerContext, cnr containerSDK.Container) error {
// fetch native name and zone // fetch domain info
ctx.name, ctx.zone = containerSDK.GetNativeNameWithZone(cnr) ctx.d = containerSDK.ReadDomain(cnr)
// if PutNamed event => check if values in container correspond to args // if PutNamed event => check if values in container correspond to args
if named, ok := ctx.e.(interface { if named, ok := ctx.e.(interface {
Name() string Name() string
Zone() string Zone() string
}); ok { }); ok {
if name := named.Name(); name != ctx.name { if name := named.Name(); name != ctx.d.Name() {
return fmt.Errorf("names differ %s/%s", name, ctx.name) return fmt.Errorf("names differ %s/%s", name, ctx.d.Name())
} }
if zone := named.Zone(); zone != ctx.zone { if zone := named.Zone(); zone != ctx.d.Zone() {
return fmt.Errorf("zones differ %s/%s", zone, ctx.zone) return fmt.Errorf("zones differ %s/%s", zone, ctx.d.Zone())
} }
} }
return nil return nil
} }
func checkSubnet(subCli *morphsubnet.Client, cnr *containerSDK.Container) error { func checkSubnet(subCli *morphsubnet.Client, cnr containerSDK.Container) error {
owner := cnr.OwnerID()
if owner == nil {
return errors.New("missing owner")
}
policy := cnr.PlacementPolicy()
if policy == nil {
return errors.New("missing placement policy")
}
prm := morphsubnet.UserAllowedPrm{} prm := morphsubnet.UserAllowedPrm{}
subID := policy.Subnet() subID := cnr.PlacementPolicy().Subnet()
if subnetid.IsZero(subID) { if subnetid.IsZero(subID) {
return nil return nil
} }
prm.SetID(subID.Marshal()) prm.SetID(subID.Marshal())
prm.SetClient(owner.WalletBytes()) prm.SetClient(cnr.Owner().WalletBytes())
res, err := subCli.UserAllowed(prm) res, err := subCli.UserAllowed(prm)
if err != nil { if err != nil {

View file

@ -56,13 +56,8 @@ func (cp *Processor) checkSetEACL(e container.SetEACL) error {
return errors.New("ACL extension disabled by container basic ACL") return errors.New("ACL extension disabled by container basic ACL")
} }
ownerContainer := cnr.Value.OwnerID()
if ownerContainer == nil {
return errors.New("missing container owner")
}
err = cp.verifySignature(signatureVerificationData{ err = cp.verifySignature(signatureVerificationData{
ownerContainer: *ownerContainer, ownerContainer: cnr.Value.Owner(),
verb: session.VerbContainerSetEACL, verb: session.VerbContainerSetEACL,
idContainerSet: true, idContainerSet: true,
idContainer: idCnr, idContainer: idCnr,

View file

@ -6,7 +6,6 @@ import (
"crypto/elliptic" "crypto/elliptic"
"crypto/sha256" "crypto/sha256"
"encoding/hex" "encoding/hex"
"errors"
"fmt" "fmt"
"math/big" "math/big"
@ -93,8 +92,8 @@ func (n nodeInfoWrapper) Price() *big.Int {
return big.NewInt(int64(n.ni.Price())) return big.NewInt(int64(n.ni.Price()))
} }
func (c *containerWrapper) Owner() user.ID { func (c containerWrapper) Owner() user.ID {
return *(*containerAPI.Container)(c).OwnerID() return (containerAPI.Container)(c).Owner()
} }
func (s settlementDeps) AuditResultsForEpoch(epoch uint64) ([]*auditAPI.Result, error) { func (s settlementDeps) AuditResultsForEpoch(epoch uint64) ([]*auditAPI.Result, error) {
@ -123,7 +122,7 @@ func (s settlementDeps) ContainerInfo(cid cid.ID) (common.ContainerInfo, error)
return nil, fmt.Errorf("could not get container from storage: %w", err) return nil, fmt.Errorf("could not get container from storage: %w", err)
} }
return (*containerWrapper)(cnr.Value), nil return (containerWrapper)(cnr.Value), nil
} }
func (s settlementDeps) buildContainer(e uint64, cid cid.ID) ([][]netmapAPI.NodeInfo, *netmapAPI.NetMap, error) { func (s settlementDeps) buildContainer(e uint64, cid cid.ID) ([][]netmapAPI.NodeInfo, *netmapAPI.NetMap, error) {
@ -147,16 +146,11 @@ func (s settlementDeps) buildContainer(e uint64, cid cid.ID) ([][]netmapAPI.Node
return nil, nil, fmt.Errorf("could not get container from sidechain: %w", err) return nil, nil, fmt.Errorf("could not get container from sidechain: %w", err)
} }
policy := cnr.Value.PlacementPolicy()
if policy == nil {
return nil, nil, errors.New("missing placement policy in container")
}
binCnr := make([]byte, sha256.Size) binCnr := make([]byte, sha256.Size)
cid.Encode(binCnr) cid.Encode(binCnr)
cn, err := nm.ContainerNodes( cn, err := nm.ContainerNodes(
*policy, cnr.Value.PlacementPolicy(),
binCnr, // may be replace pivot calculation to neofs-api-go binCnr, // may be replace pivot calculation to neofs-api-go
) )
if err != nil { if err != nil {

View file

@ -11,7 +11,6 @@ import (
core "github.com/nspcc-dev/neofs-node/pkg/core/container" core "github.com/nspcc-dev/neofs-node/pkg/core/container"
"github.com/nspcc-dev/neofs-node/pkg/morph/client" "github.com/nspcc-dev/neofs-node/pkg/morph/client"
apistatus "github.com/nspcc-dev/neofs-sdk-go/client/status" apistatus "github.com/nspcc-dev/neofs-sdk-go/client/status"
"github.com/nspcc-dev/neofs-sdk-go/container"
cid "github.com/nspcc-dev/neofs-sdk-go/container/id" cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
neofscrypto "github.com/nspcc-dev/neofs-sdk-go/crypto" neofscrypto "github.com/nspcc-dev/neofs-sdk-go/crypto"
"github.com/nspcc-dev/neofs-sdk-go/session" "github.com/nspcc-dev/neofs-sdk-go/session"
@ -90,7 +89,6 @@ func (c *Client) Get(cid []byte) (*containercore.Container, error) {
var cnr containercore.Container var cnr containercore.Container
cnr.Value = container.New()
if err := cnr.Value.Unmarshal(cnrBytes); err != nil { if err := cnr.Value.Unmarshal(cnrBytes); err != nil {
// use other major version if there any // use other major version if there any
return nil, fmt.Errorf("can't unmarshal container: %w", err) return nil, fmt.Errorf("can't unmarshal container: %w", err)

View file

@ -2,7 +2,6 @@ package container
import ( import (
"crypto/sha256" "crypto/sha256"
"errors"
"fmt" "fmt"
v2refs "github.com/nspcc-dev/neofs-api-go/v2/refs" v2refs "github.com/nspcc-dev/neofs-api-go/v2/refs"
@ -13,14 +12,14 @@ import (
// AnnounceLoadPrm groups parameters of AnnounceLoad operation. // AnnounceLoadPrm groups parameters of AnnounceLoad operation.
type AnnounceLoadPrm struct { type AnnounceLoadPrm struct {
a container.UsedSpaceAnnouncement a container.SizeEstimation
key []byte key []byte
client.InvokePrmOptional client.InvokePrmOptional
} }
// SetAnnouncement sets announcement. // SetAnnouncement sets announcement.
func (a2 *AnnounceLoadPrm) SetAnnouncement(a container.UsedSpaceAnnouncement) { func (a2 *AnnounceLoadPrm) SetAnnouncement(a container.SizeEstimation) {
a2.a = a a2.a = a
} }
@ -34,17 +33,12 @@ func (a2 *AnnounceLoadPrm) SetReporter(key []byte) {
// //
// Returns any error encountered that caused the saving to interrupt. // Returns any error encountered that caused the saving to interrupt.
func (c *Client) AnnounceLoad(p AnnounceLoadPrm) error { func (c *Client) AnnounceLoad(p AnnounceLoadPrm) error {
cnr, ok := p.a.ContainerID()
if !ok {
return errors.New("missing container for load announcement")
}
binCnr := make([]byte, sha256.Size) binCnr := make([]byte, sha256.Size)
cnr.Encode(binCnr) p.a.Container().Encode(binCnr)
prm := client.InvokePrm{} prm := client.InvokePrm{}
prm.SetMethod(putSizeMethod) prm.SetMethod(putSizeMethod)
prm.SetArgs(p.a.Epoch(), binCnr, p.a.UsedSpace(), p.key) prm.SetArgs(p.a.Epoch(), binCnr, p.a.Value(), p.key)
prm.InvokePrmOptional = p.InvokePrmOptional prm.InvokePrmOptional = p.InvokePrmOptional
err := c.client.Invoke(prm) err := c.client.Invoke(prm)

View file

@ -1,7 +1,6 @@
package container package container
import ( import (
"crypto/sha256"
"fmt" "fmt"
"github.com/nspcc-dev/neofs-api-go/v2/refs" "github.com/nspcc-dev/neofs-api-go/v2/refs"
@ -16,21 +15,14 @@ import (
// //
// Returns error if container is nil. // Returns error if container is nil.
func Put(c *Client, cnr containercore.Container) (*cid.ID, error) { func Put(c *Client, cnr containercore.Container) (*cid.ID, error) {
if cnr.Value == nil { data := cnr.Value.Marshal()
return nil, errNilArgument
}
data, err := cnr.Value.Marshal() d := container.ReadDomain(cnr.Value)
if err != nil {
return nil, fmt.Errorf("can't marshal container: %w", err)
}
name, zone := container.GetNativeNameWithZone(cnr.Value)
var prm PutPrm var prm PutPrm
prm.SetContainer(data) prm.SetContainer(data)
prm.SetName(name) prm.SetName(d.Name())
prm.SetZone(zone) prm.SetZone(d.Zone())
if cnr.Session != nil { if cnr.Session != nil {
prm.SetToken(cnr.Session.Marshal()) prm.SetToken(cnr.Session.Marshal())
@ -43,13 +35,13 @@ func Put(c *Client, cnr containercore.Container) (*cid.ID, error) {
prm.SetKey(sigV2.GetKey()) prm.SetKey(sigV2.GetKey())
prm.SetSignature(sigV2.GetSign()) prm.SetSignature(sigV2.GetSign())
err = c.Put(prm) err := c.Put(prm)
if err != nil { if err != nil {
return nil, err return nil, err
} }
var id cid.ID var id cid.ID
id.SetSHA256(sha256.Sum256(data)) container.CalculateIDFromBinary(&id, data)
return &id, nil return &id, nil
} }

View file

@ -17,7 +17,7 @@ type Task struct {
idCnr cid.ID idCnr cid.ID
cnr *container.Container cnr container.Container
nm *netmap.NetMap nm *netmap.NetMap
@ -69,7 +69,7 @@ func (t *Task) ContainerID() cid.ID {
} }
// WithContainerStructure sets structure of the container under audit. // WithContainerStructure sets structure of the container under audit.
func (t *Task) WithContainerStructure(cnr *container.Container) *Task { func (t *Task) WithContainerStructure(cnr container.Container) *Task {
if t != nil { if t != nil {
t.cnr = cnr t.cnr = cnr
} }
@ -78,7 +78,7 @@ func (t *Task) WithContainerStructure(cnr *container.Container) *Task {
} }
// ContainerStructure returns structure of the container under audit. // ContainerStructure returns structure of the container under audit.
func (t *Task) ContainerStructure() *container.Container { func (t *Task) ContainerStructure() container.Container {
return t.cnr return t.cnr
} }

View file

@ -29,7 +29,7 @@ type announceContext struct {
commonContext commonContext
} }
// Start starts the processing of UsedSpaceAnnouncement values. // Start starts the processing of container.SizeEstimation values.
// //
// Single Start operation overtakes all data from LocalMetrics to // Single Start operation overtakes all data from LocalMetrics to
// LocalAnnouncementTarget (Controller's parameters). // LocalAnnouncementTarget (Controller's parameters).
@ -82,10 +82,10 @@ func (c *announceContext) announce() {
// iterate over all collected metrics and write them to the target // iterate over all collected metrics and write them to the target
err = metricsIterator.Iterate( err = metricsIterator.Iterate(
func(container.UsedSpaceAnnouncement) bool { func(container.SizeEstimation) bool {
return true // local metrics don't know about epochs return true // local metrics don't know about epochs
}, },
func(a container.UsedSpaceAnnouncement) error { func(a container.SizeEstimation) error {
a.SetEpoch(c.epoch) // set epoch explicitly a.SetEpoch(c.epoch) // set epoch explicitly
return targetWriter.Put(a) return targetWriter.Put(a)
}, },
@ -179,7 +179,7 @@ type stopContext struct {
commonContext commonContext
} }
// Stop interrupts the processing of UsedSpaceAnnouncement values. // Stop interrupts the processing of container.SizeEstimation values.
// //
// Single Stop operation releases an announcement context and overtakes // Single Stop operation releases an announcement context and overtakes
// all data from AnnouncementAccumulator to ResultReceiver (Controller's // all data from AnnouncementAccumulator to ResultReceiver (Controller's

View file

@ -19,12 +19,12 @@ type testAnnouncementStorage struct {
mtx sync.RWMutex mtx sync.RWMutex
m map[uint64][]container.UsedSpaceAnnouncement m map[uint64][]container.SizeEstimation
} }
func newTestStorage() *testAnnouncementStorage { func newTestStorage() *testAnnouncementStorage {
return &testAnnouncementStorage{ return &testAnnouncementStorage{
m: make(map[uint64][]container.UsedSpaceAnnouncement), m: make(map[uint64][]container.SizeEstimation),
} }
} }
@ -61,7 +61,7 @@ func (s *testAnnouncementStorage) InitWriter(context.Context) (loadcontroller.Wr
return s, nil return s, nil
} }
func (s *testAnnouncementStorage) Put(v container.UsedSpaceAnnouncement) error { func (s *testAnnouncementStorage) Put(v container.SizeEstimation) error {
s.mtx.Lock() s.mtx.Lock()
s.m[v.Epoch()] = append(s.m[v.Epoch()], v) s.m[v.Epoch()] = append(s.m[v.Epoch()], v)
s.mtx.Unlock() s.mtx.Unlock()
@ -73,12 +73,11 @@ func (s *testAnnouncementStorage) Close() error {
return nil return nil
} }
func randAnnouncement() container.UsedSpaceAnnouncement { func randAnnouncement() (a container.SizeEstimation) {
a := container.NewAnnouncement() a.SetContainer(cidtest.ID())
a.SetContainerID(cidtest.ID()) a.SetValue(rand.Uint64())
a.SetUsedSpace(rand.Uint64())
return *a return
} }
func TestSimpleScenario(t *testing.T) { func TestSimpleScenario(t *testing.T) {
@ -116,7 +115,7 @@ func TestSimpleScenario(t *testing.T) {
const goodNum = 4 const goodNum = 4
// create 2 random values for processing epoch and 1 for some different // create 2 random values for processing epoch and 1 for some different
announces := make([]container.UsedSpaceAnnouncement, 0, goodNum) announces := make([]container.SizeEstimation, 0, goodNum)
for i := 0; i < goodNum; i++ { for i := 0; i < goodNum; i++ {
a := randAnnouncement() a := randAnnouncement()
@ -174,13 +173,13 @@ func TestSimpleScenario(t *testing.T) {
wg.Wait() wg.Wait()
// result target should contain all "good" announcements and shoult not container the "bad" one // result target should contain all "good" announcements and shoult not container the "bad" one
var res []container.UsedSpaceAnnouncement var res []container.SizeEstimation
err := resultStorage.Iterate( err := resultStorage.Iterate(
func(a container.UsedSpaceAnnouncement) bool { func(a container.SizeEstimation) bool {
return true return true
}, },
func(a container.UsedSpaceAnnouncement) error { func(a container.SizeEstimation) error {
res = append(res, a) res = append(res, a)
return nil return nil
}, },

View file

@ -7,22 +7,22 @@ import (
"github.com/nspcc-dev/neofs-sdk-go/container" "github.com/nspcc-dev/neofs-sdk-go/container"
) )
// UsedSpaceHandler describes the signature of the UsedSpaceAnnouncement // UsedSpaceHandler describes the signature of the container.SizeEstimation
// value handling function. // value handling function.
// //
// Termination of processing without failures is usually signaled // Termination of processing without failures is usually signaled
// with a zero error, while a specific value may describe the reason // with a zero error, while a specific value may describe the reason
// for failure. // for failure.
type UsedSpaceHandler func(container.UsedSpaceAnnouncement) error type UsedSpaceHandler func(container.SizeEstimation) error
// UsedSpaceFilter describes the signature of the function for // UsedSpaceFilter describes the signature of the function for
// checking whether a value meets a certain criterion. // checking whether a value meets a certain criterion.
// //
// Return of true means conformity, false - vice versa. // Return of true means conformity, false - vice versa.
type UsedSpaceFilter func(container.UsedSpaceAnnouncement) bool type UsedSpaceFilter func(container.SizeEstimation) bool
// Iterator is a group of methods provided by entity // Iterator is a group of methods provided by entity
// which can iterate over a group of UsedSpaceAnnouncement values. // which can iterate over a group of container.SizeEstimation values.
type Iterator interface { type Iterator interface {
// Iterate must start an iterator over values that // Iterate must start an iterator over values that
// meet the filter criterion (returns true). // meet the filter criterion (returns true).
@ -37,7 +37,7 @@ type Iterator interface {
// IteratorProvider is a group of methods provided // IteratorProvider is a group of methods provided
// by entity which generates iterators over // by entity which generates iterators over
// UsedSpaceAnnouncement values. // container.SizeEstimation values.
type IteratorProvider interface { type IteratorProvider interface {
// InitIterator should return an initialized Iterator. // InitIterator should return an initialized Iterator.
// //
@ -49,12 +49,12 @@ type IteratorProvider interface {
InitIterator(context.Context) (Iterator, error) InitIterator(context.Context) (Iterator, error)
} }
// Writer describes the interface for storing UsedSpaceAnnouncement values. // Writer describes the interface for storing container.SizeEstimation values.
// //
// This interface is provided by both local storage // This interface is provided by both local storage
// of values and remote (wrappers over the RPC). // of values and remote (wrappers over the RPC).
type Writer interface { type Writer interface {
// Put performs a write operation of UsedSpaceAnnouncement value // Put performs a write operation of container.SizeEstimation value
// and returns any error encountered. // and returns any error encountered.
// //
// All values after the Close call must be flushed to the // All values after the Close call must be flushed to the
@ -62,7 +62,7 @@ type Writer interface {
// Close operation. // Close operation.
// //
// Put must not be called after Close. // Put must not be called after Close.
Put(container.UsedSpaceAnnouncement) error Put(container.SizeEstimation) error
// Close exits with method-providing Writer. // Close exits with method-providing Writer.
// //
@ -75,7 +75,7 @@ type Writer interface {
// WriterProvider is a group of methods provided // WriterProvider is a group of methods provided
// by entity which generates keepers of // by entity which generates keepers of
// UsedSpaceAnnouncement values. // container.SizeEstimation values.
type WriterProvider interface { type WriterProvider interface {
// InitWriter should return an initialized Writer. // InitWriter should return an initialized Writer.
// //

View file

@ -7,7 +7,7 @@ import (
) )
func usedSpaceFilterEpochEQ(epoch uint64) UsedSpaceFilter { func usedSpaceFilterEpochEQ(epoch uint64) UsedSpaceFilter {
return func(a container.UsedSpaceAnnouncement) bool { return func(a container.SizeEstimation) bool {
return a.Epoch() == epoch return a.Epoch() == epoch
} }
} }

View file

@ -3,7 +3,6 @@ package loadroute
import ( import (
"context" "context"
"encoding/hex" "encoding/hex"
"errors"
"sync" "sync"
loadcontroller "github.com/nspcc-dev/neofs-node/pkg/services/container/announcement/load/controller" loadcontroller "github.com/nspcc-dev/neofs-node/pkg/services/container/announcement/load/controller"
@ -71,7 +70,7 @@ type routeKey struct {
type valuesRoute struct { type valuesRoute struct {
route []ServerInfo route []ServerInfo
values []container.UsedSpaceAnnouncement values []container.SizeEstimation
} }
type loadWriter struct { type loadWriter struct {
@ -85,18 +84,13 @@ type loadWriter struct {
mServers map[string]loadcontroller.Writer mServers map[string]loadcontroller.Writer
} }
func (w *loadWriter) Put(a container.UsedSpaceAnnouncement) error { func (w *loadWriter) Put(a container.SizeEstimation) error {
cnr, ok := a.ContainerID()
if !ok {
return errors.New("missing container in load announcement")
}
w.routeMtx.Lock() w.routeMtx.Lock()
defer w.routeMtx.Unlock() defer w.routeMtx.Unlock()
key := routeKey{ key := routeKey{
epoch: a.Epoch(), epoch: a.Epoch(),
cid: cnr.EncodeToString(), cid: a.Container().EncodeToString(),
} }
routeValues, ok := w.mRoute[key] routeValues, ok := w.mRoute[key]
@ -110,7 +104,7 @@ func (w *loadWriter) Put(a container.UsedSpaceAnnouncement) error {
routeValues = &valuesRoute{ routeValues = &valuesRoute{
route: route, route: route,
values: []container.UsedSpaceAnnouncement{a}, values: []container.SizeEstimation{a},
} }
w.mRoute[key] = routeValues w.mRoute[key] = routeValues

View file

@ -33,7 +33,7 @@ type Builder interface {
// in that list (means that point is the last point in one of the route groups), // in that list (means that point is the last point in one of the route groups),
// returned route must contain nil point that should be interpreted as signal to, // returned route must contain nil point that should be interpreted as signal to,
// among sending to other route points, save the announcement in that point. // among sending to other route points, save the announcement in that point.
NextStage(a container.UsedSpaceAnnouncement, passed []ServerInfo) ([]ServerInfo, error) NextStage(a container.SizeEstimation, passed []ServerInfo) ([]ServerInfo, error)
} }
// RemoteWriterProvider describes the component // RemoteWriterProvider describes the component

View file

@ -2,7 +2,6 @@ package placementrouter
import ( import (
"bytes" "bytes"
"errors"
"fmt" "fmt"
netmapcore "github.com/nspcc-dev/neofs-node/pkg/core/netmap" netmapcore "github.com/nspcc-dev/neofs-node/pkg/core/netmap"
@ -16,15 +15,12 @@ import (
// If passed route has more than one point, then endpoint of the route is reached. // If passed route has more than one point, then endpoint of the route is reached.
// //
// The traversed route is not checked, it is assumed to be correct. // The traversed route is not checked, it is assumed to be correct.
func (b *Builder) NextStage(a container.UsedSpaceAnnouncement, passed []loadroute.ServerInfo) ([]loadroute.ServerInfo, error) { func (b *Builder) NextStage(a container.SizeEstimation, passed []loadroute.ServerInfo) ([]loadroute.ServerInfo, error) {
if len(passed) > 1 { if len(passed) > 1 {
return nil, nil return nil, nil
} }
cnr, ok := a.ContainerID() cnr := a.Container()
if !ok {
return nil, errors.New("missing container in load announcement")
}
placement, err := b.placementBuilder.BuildPlacement(a.Epoch(), cnr) placement, err := b.placementBuilder.BuildPlacement(a.Epoch(), cnr)
if err != nil { if err != nil {

View file

@ -12,7 +12,7 @@ var errWrongRoute = errors.New("wrong route")
// CheckRoute checks if the route is a route correctly constructed by the builder for value a. // CheckRoute checks if the route is a route correctly constructed by the builder for value a.
// //
// Returns nil if route is correct, otherwise an error clarifying the inconsistency. // Returns nil if route is correct, otherwise an error clarifying the inconsistency.
func CheckRoute(builder Builder, a container.UsedSpaceAnnouncement, route []ServerInfo) error { func CheckRoute(builder Builder, a container.SizeEstimation, route []ServerInfo) error {
for i := 1; i < len(route); i++ { for i := 1; i < len(route); i++ {
servers, err := builder.NextStage(a, route[:i]) servers, err := builder.NextStage(a, route[:i])
if err != nil { if err != nil {

View file

@ -1,7 +1,6 @@
package loadstorage package loadstorage
import ( import (
"errors"
"sort" "sort"
"sync" "sync"
@ -10,7 +9,7 @@ import (
) )
type usedSpaceEstimations struct { type usedSpaceEstimations struct {
announcement container.UsedSpaceAnnouncement announcement container.SizeEstimation
sizes []uint64 sizes []uint64
} }
@ -22,7 +21,7 @@ type storageKey struct {
} }
// Storage represents in-memory storage of // Storage represents in-memory storage of
// UsedSpaceAnnouncement values. // container.SizeEstimation values.
// //
// The write operation has the usual behavior - to save // The write operation has the usual behavior - to save
// the next number of used container space for a specific epoch. // the next number of used container space for a specific epoch.
@ -63,18 +62,13 @@ func New(_ Prm) *Storage {
// to the list of already saved values. // to the list of already saved values.
// //
// Always returns nil error. // Always returns nil error.
func (s *Storage) Put(a container.UsedSpaceAnnouncement) error { func (s *Storage) Put(a container.SizeEstimation) error {
cnr, ok := a.ContainerID()
if !ok {
return errors.New("missing container in load announcement")
}
s.mtx.Lock() s.mtx.Lock()
{ {
key := storageKey{ key := storageKey{
epoch: a.Epoch(), epoch: a.Epoch(),
cid: cnr.EncodeToString(), cid: a.Container().EncodeToString(),
} }
estimations, ok := s.mItems[key] estimations, ok := s.mItems[key]
@ -87,7 +81,7 @@ func (s *Storage) Put(a container.UsedSpaceAnnouncement) error {
s.mItems[key] = estimations s.mItems[key] = estimations
} }
estimations.sizes = append(estimations.sizes, a.UsedSpace()) estimations.sizes = append(estimations.sizes, a.Value())
} }
s.mtx.Unlock() s.mtx.Unlock()
@ -110,7 +104,7 @@ func (s *Storage) Iterate(f loadcontroller.UsedSpaceFilter, h loadcontroller.Use
for _, v := range s.mItems { for _, v := range s.mItems {
if f(v.announcement) { if f(v.announcement) {
// calculate estimation based on 90th percentile // calculate estimation based on 90th percentile
v.announcement.SetUsedSpace(finalEstimation(v.sizes)) v.announcement.SetValue(finalEstimation(v.sizes))
if err = h(v.announcement); err != nil { if err = h(v.announcement); err != nil {
break break

View file

@ -12,8 +12,8 @@ import (
func TestStorage(t *testing.T) { func TestStorage(t *testing.T) {
const epoch uint64 = 13 const epoch uint64 = 13
a := container.NewAnnouncement() var a container.SizeEstimation
a.SetContainerID(cidtest.ID()) a.SetContainer(cidtest.ID())
a.SetEpoch(epoch) a.SetEpoch(epoch)
const opinionsNum = 100 const opinionsNum = 100
@ -24,25 +24,23 @@ func TestStorage(t *testing.T) {
for i := range opinions { for i := range opinions {
opinions[i] = rand.Uint64() opinions[i] = rand.Uint64()
a.SetUsedSpace(opinions[i]) a.SetValue(opinions[i])
require.NoError(t, s.Put(*a)) require.NoError(t, s.Put(a))
} }
iterCounter := 0 iterCounter := 0
err := s.Iterate( err := s.Iterate(
func(ai container.UsedSpaceAnnouncement) bool { func(ai container.SizeEstimation) bool {
return ai.Epoch() == epoch return ai.Epoch() == epoch
}, },
func(ai container.UsedSpaceAnnouncement) error { func(ai container.SizeEstimation) error {
iterCounter++ iterCounter++
require.Equal(t, epoch, ai.Epoch()) require.Equal(t, epoch, ai.Epoch())
cnr1, _ := a.ContainerID() require.Equal(t, a.Container(), ai.Container())
cnr2, _ := ai.ContainerID() require.Equal(t, finalEstimation(opinions), ai.Value())
require.Equal(t, cnr1, cnr2)
require.Equal(t, finalEstimation(opinions), ai.UsedSpace())
return nil return nil
}, },

View file

@ -11,7 +11,6 @@ import (
containercore "github.com/nspcc-dev/neofs-node/pkg/core/container" containercore "github.com/nspcc-dev/neofs-node/pkg/core/container"
containerSvc "github.com/nspcc-dev/neofs-node/pkg/services/container" containerSvc "github.com/nspcc-dev/neofs-node/pkg/services/container"
"github.com/nspcc-dev/neofs-node/pkg/services/object/acl/eacl" "github.com/nspcc-dev/neofs-node/pkg/services/object/acl/eacl"
containerSDK "github.com/nspcc-dev/neofs-sdk-go/container"
cid "github.com/nspcc-dev/neofs-sdk-go/container/id" cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
eaclSDK "github.com/nspcc-dev/neofs-sdk-go/eacl" eaclSDK "github.com/nspcc-dev/neofs-sdk-go/eacl"
"github.com/nspcc-dev/neofs-sdk-go/session" "github.com/nspcc-dev/neofs-sdk-go/session"
@ -58,8 +57,16 @@ func (s *morphExecutor) Put(_ context.Context, tokV2 *sessionV2.Token, body *con
return nil, errors.New("missing signature") return nil, errors.New("missing signature")
} }
cnr := containercore.Container{ cnrV2 := body.GetContainer()
Value: containerSDK.NewContainerFromV2(body.GetContainer()), if cnrV2 == nil {
return nil, errors.New("missing container field")
}
var cnr containercore.Container
err := cnr.Value.ReadFromV2(*cnrV2)
if err != nil {
return nil, fmt.Errorf("invalid container: %w", err)
} }
cnr.Signature.ReadFromV2(*sigV2) cnr.Signature.ReadFromV2(*sigV2)
@ -158,8 +165,11 @@ func (s *morphExecutor) Get(ctx context.Context, body *container.GetRequestBody)
cnr.Session.WriteToV2(tokV2) cnr.Session.WriteToV2(tokV2)
} }
var cnrV2 container.Container
cnr.Value.WriteToV2(&cnrV2)
res := new(container.GetResponseBody) res := new(container.GetResponseBody)
res.SetContainer(cnr.Value.ToV2()) res.SetContainer(&cnrV2)
res.SetSignature(sigV2) res.SetSignature(sigV2)
res.SetSessionToken(tokV2) res.SetSessionToken(tokV2)

View file

@ -12,6 +12,7 @@ import (
containerSvcMorph "github.com/nspcc-dev/neofs-node/pkg/services/container/morph" containerSvcMorph "github.com/nspcc-dev/neofs-node/pkg/services/container/morph"
cid "github.com/nspcc-dev/neofs-sdk-go/container/id" cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
cidtest "github.com/nspcc-dev/neofs-sdk-go/container/id/test" cidtest "github.com/nspcc-dev/neofs-sdk-go/container/id/test"
containertest "github.com/nspcc-dev/neofs-sdk-go/container/test"
sessiontest "github.com/nspcc-dev/neofs-sdk-go/session/test" sessiontest "github.com/nspcc-dev/neofs-sdk-go/session/test"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
) )
@ -54,6 +55,13 @@ func TestInvalidToken(t *testing.T) {
var reqBody container.PutRequestBody var reqBody container.PutRequestBody
reqBody.SetSignature(new(refs.Signature)) reqBody.SetSignature(new(refs.Signature))
cnr := containertest.Container()
var cnrV2 container.Container
cnr.WriteToV2(&cnrV2)
reqBody.SetContainer(&cnrV2)
_, err = e.Put(context.TODO(), tokV2, &reqBody) _, err = e.Put(context.TODO(), tokV2, &reqBody)
return return
}, },

View file

@ -3,7 +3,6 @@ package v2
import ( import (
"bytes" "bytes"
"crypto/sha256" "crypto/sha256"
"errors"
core "github.com/nspcc-dev/neofs-node/pkg/core/netmap" core "github.com/nspcc-dev/neofs-node/pkg/core/netmap"
"github.com/nspcc-dev/neofs-sdk-go/container" "github.com/nspcc-dev/neofs-sdk-go/container"
@ -27,12 +26,7 @@ type classifyResult struct {
func (c senderClassifier) classify( func (c senderClassifier) classify(
req MetaWithToken, req MetaWithToken,
idCnr cid.ID, idCnr cid.ID,
cnr *container.Container) (res *classifyResult, err error) { cnr container.Container) (res *classifyResult, err error) {
ownerCnr := cnr.OwnerID()
if ownerCnr == nil {
return nil, errors.New("missing container owner")
}
ownerID, ownerKey, err := req.RequestOwner() ownerID, ownerKey, err := req.RequestOwner()
if err != nil { if err != nil {
return nil, err return nil, err
@ -43,7 +37,7 @@ func (c senderClassifier) classify(
// TODO: #767 get owner from neofs.id if present // TODO: #767 get owner from neofs.id if present
// if request owner is the same as container owner, return RoleUser // if request owner is the same as container owner, return RoleUser
if ownerID.Equals(*ownerCnr) { if ownerID.Equals(cnr.Owner()) {
return &classifyResult{ return &classifyResult{
role: acl.RoleOwner, role: acl.RoleOwner,
key: ownerKeyInBytes, key: ownerKeyInBytes,
@ -104,7 +98,7 @@ func (c senderClassifier) isInnerRingKey(owner []byte) (bool, error) {
func (c senderClassifier) isContainerKey( func (c senderClassifier) isContainerKey(
owner, idCnr []byte, owner, idCnr []byte,
cnr *container.Container) (bool, error) { cnr container.Container) (bool, error) {
nm, err := core.GetLatestNetworkMap(c.netmap) // first check current netmap nm, err := core.GetLatestNetworkMap(c.netmap) // first check current netmap
if err != nil { if err != nil {
return false, err return false, err
@ -130,13 +124,8 @@ func (c senderClassifier) isContainerKey(
func lookupKeyInContainer( func lookupKeyInContainer(
nm *netmap.NetMap, nm *netmap.NetMap,
owner, idCnr []byte, owner, idCnr []byte,
cnr *container.Container) (bool, error) { cnr container.Container) (bool, error) {
policy := cnr.PlacementPolicy() cnrVectors, err := nm.ContainerNodes(cnr.PlacementPolicy(), idCnr)
if policy == nil {
return false, errors.New("missing placement policy in container")
}
cnrVectors, err := nm.ContainerNodes(*policy, idCnr)
if err != nil { if err != nil {
return false, err return false, err
} }

View file

@ -506,8 +506,6 @@ func (b Service) findRequestInfo(req MetaWithToken, idCnr cid.ID, op acl.Op) (in
cnr, err := b.containers.Get(idCnr) // fetch actual container cnr, err := b.containers.Get(idCnr) // fetch actual container
if err != nil { if err != nil {
return info, err return info, err
} else if cnr.Value.OwnerID() == nil {
return info, errors.New("missing owner in container descriptor")
} }
if req.token != nil { if req.token != nil {
@ -534,7 +532,7 @@ func (b Service) findRequestInfo(req MetaWithToken, idCnr cid.ID, op acl.Op) (in
info.basicACL = cnr.Value.BasicACL() info.basicACL = cnr.Value.BasicACL()
info.requestRole = res.role info.requestRole = res.role
info.operation = op info.operation = op
info.cnrOwner = *cnr.Value.OwnerID() info.cnrOwner = cnr.Value.Owner()
info.idCnr = idCnr info.idCnr = idCnr
// it is assumed that at the moment the key will be valid, // it is assumed that at the moment the key will be valid,

View file

@ -35,7 +35,7 @@ type testStorage struct {
} }
type testTraverserGenerator struct { type testTraverserGenerator struct {
c *container.Container c container.Container
b map[uint64]placement.Builder b map[uint64]placement.Builder
} }
@ -69,7 +69,7 @@ func newTestStorage() *testStorage {
} }
func (g *testTraverserGenerator) GenerateTraverser(cnr cid.ID, obj *oid.ID, e uint64) (*placement.Traverser, error) { func (g *testTraverserGenerator) GenerateTraverser(cnr cid.ID, obj *oid.ID, e uint64) (*placement.Traverser, error) {
opts := make([]placement.Option, 3, 4) opts := make([]placement.Option, 0, 4)
opts = append(opts, opts = append(opts,
placement.ForContainer(g.c), placement.ForContainer(g.c),
placement.UseBuilder(g.b[e]), placement.UseBuilder(g.b[e]),
@ -466,9 +466,11 @@ func generateChain(ln int, cnr cid.ID) ([]*objectSDK.Object, []oid.ID, []byte) {
func TestGetRemoteSmall(t *testing.T) { func TestGetRemoteSmall(t *testing.T) {
ctx := context.Background() ctx := context.Background()
pp := netmaptest.PlacementPolicy() var cnr container.Container
cnr := container.New(container.WithPolicy(&pp)) cnr.SetPlacementPolicy(netmaptest.PlacementPolicy())
idCnr := container.CalculateID(cnr)
var idCnr cid.ID
container.CalculateID(&idCnr, cnr)
newSvc := func(b *testPlacementBuilder, c *testClientCache) *Service { newSvc := func(b *testPlacementBuilder, c *testClientCache) *Service {
svc := &Service{cfg: new(cfg)} svc := &Service{cfg: new(cfg)}
@ -1119,9 +1121,11 @@ func TestGetRemoteSmall(t *testing.T) {
func TestGetFromPastEpoch(t *testing.T) { func TestGetFromPastEpoch(t *testing.T) {
ctx := context.Background() ctx := context.Background()
pp := netmaptest.PlacementPolicy() var cnr container.Container
cnr := container.New(container.WithPolicy(&pp)) cnr.SetPlacementPolicy(netmaptest.PlacementPolicy())
idCnr := container.CalculateID(cnr)
var idCnr cid.ID
container.CalculateID(&idCnr, cnr)
addr := oidtest.Address() addr := oidtest.Address()
addr.SetContainer(idCnr) addr.SetContainer(idCnr)

View file

@ -33,7 +33,7 @@ type testStorage struct {
} }
type testTraverserGenerator struct { type testTraverserGenerator struct {
c *container.Container c container.Container
b map[uint64]placement.Builder b map[uint64]placement.Builder
} }
@ -241,8 +241,11 @@ func TestGetRemoteSmall(t *testing.T) {
var pp netmap.PlacementPolicy var pp netmap.PlacementPolicy
pp.AddReplicas(rs...) pp.AddReplicas(rs...)
cnr := container.New(container.WithPolicy(&pp)) var cnr container.Container
id := container.CalculateID(cnr) cnr.SetPlacementPolicy(pp)
var id cid.ID
container.CalculateID(&id, cnr)
newSvc := func(b *testPlacementBuilder, c *testClientCache) *Service { newSvc := func(b *testPlacementBuilder, c *testClientCache) *Service {
svc := &Service{cfg: new(cfg)} svc := &Service{cfg: new(cfg)}
@ -327,8 +330,11 @@ func TestGetFromPastEpoch(t *testing.T) {
var pp netmap.PlacementPolicy var pp netmap.PlacementPolicy
pp.AddReplicas(rs...) pp.AddReplicas(rs...)
cnr := container.New(container.WithPolicy(&pp)) var cnr container.Container
idCnr := container.CalculateID(cnr) cnr.SetPlacementPolicy(pp)
var idCnr cid.ID
container.CalculateID(&idCnr, cnr)
var addr oid.Address var addr oid.Address
addr.SetContainer(idCnr) addr.SetContainer(idCnr)

View file

@ -45,7 +45,8 @@ type cfg struct {
obj *oid.ID obj *oid.ID
policy *netmap.PlacementPolicy policySet bool
policy netmap.PlacementPolicy
builder Builder builder Builder
} }
@ -74,11 +75,11 @@ func NewTraverser(opts ...Option) (*Traverser, error) {
if cfg.builder == nil { if cfg.builder == nil {
return nil, fmt.Errorf("%s: %w", invalidOptsMsg, errNilBuilder) return nil, fmt.Errorf("%s: %w", invalidOptsMsg, errNilBuilder)
} else if cfg.policy == nil { } else if !cfg.policySet {
return nil, fmt.Errorf("%s: %w", invalidOptsMsg, errNilPolicy) return nil, fmt.Errorf("%s: %w", invalidOptsMsg, errNilPolicy)
} }
ns, err := cfg.builder.BuildPlacement(cfg.cnr, cfg.obj, *cfg.policy) ns, err := cfg.builder.BuildPlacement(cfg.cnr, cfg.obj, cfg.policy)
if err != nil { if err != nil {
return nil, fmt.Errorf("could not build placement: %w", err) return nil, fmt.Errorf("could not build placement: %w", err)
} }
@ -219,10 +220,11 @@ func UseBuilder(b Builder) Option {
} }
// ForContainer is a traversal container setting option. // ForContainer is a traversal container setting option.
func ForContainer(cnr *container.Container) Option { func ForContainer(cnr container.Container) Option {
return func(c *cfg) { return func(c *cfg) {
c.policy = cnr.PlacementPolicy() c.policy = cnr.PlacementPolicy()
c.cnr = container.CalculateID(cnr) c.policySet = true
container.CalculateID(&c.cnr, cnr)
} }
} }

View file

@ -40,7 +40,7 @@ func copyVectors(v [][]netmap.NodeInfo) [][]netmap.NodeInfo {
return vc return vc
} }
func testPlacement(t *testing.T, ss, rs []int) ([][]netmap.NodeInfo, *container.Container) { func testPlacement(t *testing.T, ss, rs []int) ([][]netmap.NodeInfo, container.Container) {
nodes := make([][]netmap.NodeInfo, 0, len(rs)) nodes := make([][]netmap.NodeInfo, 0, len(rs))
replicas := make([]netmap.ReplicaDescriptor, 0, len(rs)) replicas := make([]netmap.ReplicaDescriptor, 0, len(rs))
num := uint32(0) num := uint32(0)
@ -61,10 +61,13 @@ func testPlacement(t *testing.T, ss, rs []int) ([][]netmap.NodeInfo, *container.
replicas = append(replicas, rd) replicas = append(replicas, rd)
} }
policy := new(netmap.PlacementPolicy) var policy netmap.PlacementPolicy
policy.AddReplicas(replicas...) policy.AddReplicas(replicas...)
return nodes, container.New(container.WithPolicy(policy)) var cnr container.Container
cnr.SetPlacementPolicy(policy)
return nodes, cnr
} }
func assertSameAddress(t *testing.T, ni netmap.NodeInfo, addr network.AddressGroup) { func assertSameAddress(t *testing.T, ni netmap.NodeInfo, addr network.AddressGroup) {

View file

@ -45,17 +45,9 @@ func (p *Policer) processObject(ctx context.Context, addr oid.Address) {
} }
policy := cnr.Value.PlacementPolicy() policy := cnr.Value.PlacementPolicy()
if policy == nil {
p.log.Error("missing placement policy in container",
zap.Stringer("cid", idCnr),
)
return
}
obj := addr.Object() obj := addr.Object()
nn, err := p.placementBuilder.BuildPlacement(idCnr, &obj, *policy) nn, err := p.placementBuilder.BuildPlacement(idCnr, &obj, policy)
if err != nil { if err != nil {
p.log.Error("could not build placement vector for object", p.log.Error("could not build placement vector for object",
zap.String("error", err.Error()), zap.String("error", err.Error()),