forked from TrueCloudLab/frostfs-contract
c3b00e0011
Signed-off-by: Evgenii Stratonikov <evgeniy@morphbits.ru>
828 lines
24 KiB
Go
828 lines
24 KiB
Go
package netmap
|
|
|
|
import (
|
|
"github.com/nspcc-dev/neo-go/pkg/interop"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/contract"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/iterator"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/crypto"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/ledger"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/management"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/std"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/runtime"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/storage"
|
|
"github.com/nspcc-dev/neofs-contract/common"
|
|
)
|
|
|
|
// NodeState is an enumeration for node states.
|
|
type NodeState int
|
|
|
|
// Various Node states
|
|
const (
|
|
_ NodeState = iota
|
|
|
|
// NodeStateOnline stands for nodes that are in full network and
|
|
// operational availability.
|
|
NodeStateOnline
|
|
|
|
// NodeStateOffline stands for nodes that are in network unavailability.
|
|
NodeStateOffline
|
|
|
|
// NodeStateMaintenance stands for nodes under maintenance with partial
|
|
// network availability.
|
|
NodeStateMaintenance
|
|
)
|
|
|
|
// Node groups data related to NeoFS storage nodes registered in the NeoFS
|
|
// network. The information is stored in the current contract.
|
|
type Node struct {
|
|
// Information about the node encoded according to the NeoFS binary
|
|
// protocol.
|
|
BLOB []byte
|
|
|
|
// Current node state.
|
|
State NodeState
|
|
}
|
|
|
|
const (
|
|
notaryDisabledKey = "notary"
|
|
innerRingKey = "innerring"
|
|
|
|
// DefaultSnapshotCount contains the number of previous snapshots stored by this contract.
|
|
// Must be less than 255.
|
|
DefaultSnapshotCount = 10
|
|
snapshotCountKey = "snapshotCount"
|
|
snapshotKeyPrefix = "snapshot_"
|
|
snapshotCurrentIDKey = "snapshotCurrent"
|
|
snapshotEpoch = "snapshotEpoch"
|
|
snapshotBlockKey = "snapshotBlock"
|
|
|
|
containerContractKey = "containerScriptHash"
|
|
balanceContractKey = "balanceScriptHash"
|
|
|
|
cleanupEpochMethod = "newEpoch"
|
|
)
|
|
|
|
var (
|
|
configPrefix = []byte("config")
|
|
candidatePrefix = []byte("candidate")
|
|
)
|
|
|
|
// _deploy function sets up initial list of inner ring public keys.
|
|
func _deploy(data interface{}, isUpdate bool) {
|
|
ctx := storage.GetContext()
|
|
|
|
var args = data.(struct {
|
|
notaryDisabled bool
|
|
addrBalance interop.Hash160
|
|
addrContainer interop.Hash160
|
|
keys []interop.PublicKey
|
|
config [][]byte
|
|
version int
|
|
})
|
|
|
|
ln := len(args.config)
|
|
if ln%2 != 0 {
|
|
panic("bad configuration")
|
|
}
|
|
|
|
for i := 0; i < ln/2; i++ {
|
|
key := args.config[i*2]
|
|
val := args.config[i*2+1]
|
|
|
|
setConfig(ctx, key, val)
|
|
}
|
|
|
|
if isUpdate {
|
|
common.CheckVersion(args.version)
|
|
|
|
count := getSnapshotCount(ctx)
|
|
prefix := []byte(snapshotKeyPrefix)
|
|
for i := 0; i < count; i++ {
|
|
key := append(prefix, byte(i))
|
|
data := storage.Get(ctx, key)
|
|
if data != nil {
|
|
nodes := std.Deserialize(data.([]byte)).([]Node)
|
|
for i := range nodes {
|
|
// Old structure contains only the first field,
|
|
// second is implicitly assumed to be Online.
|
|
nodes[i] = Node{
|
|
BLOB: nodes[i].BLOB,
|
|
State: NodeStateOnline,
|
|
}
|
|
}
|
|
common.SetSerialized(ctx, key, nodes)
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
if len(args.addrBalance) != interop.Hash160Len || len(args.addrContainer) != interop.Hash160Len {
|
|
panic("incorrect length of contract script hash")
|
|
}
|
|
|
|
// epoch number is a little endian int, it doesn't need to be serialized
|
|
storage.Put(ctx, snapshotCountKey, DefaultSnapshotCount)
|
|
storage.Put(ctx, snapshotEpoch, 0)
|
|
storage.Put(ctx, snapshotBlockKey, 0)
|
|
|
|
prefix := []byte(snapshotKeyPrefix)
|
|
for i := 0; i < DefaultSnapshotCount; i++ {
|
|
common.SetSerialized(ctx, append(prefix, byte(i)), []Node{})
|
|
}
|
|
storage.Put(ctx, snapshotCurrentIDKey, 0)
|
|
|
|
storage.Put(ctx, balanceContractKey, args.addrBalance)
|
|
storage.Put(ctx, containerContractKey, args.addrContainer)
|
|
|
|
// initialize the way to collect signatures
|
|
storage.Put(ctx, notaryDisabledKey, args.notaryDisabled)
|
|
if args.notaryDisabled {
|
|
common.SetSerialized(ctx, innerRingKey, args.keys)
|
|
common.InitVote(ctx)
|
|
runtime.Log("netmap contract notary disabled")
|
|
}
|
|
|
|
runtime.Log("netmap contract initialized")
|
|
}
|
|
|
|
// Update method updates contract source code and manifest. It can be invoked
|
|
// only by committee.
|
|
func Update(script []byte, manifest []byte, data interface{}) {
|
|
if !common.HasUpdateAccess() {
|
|
panic("only committee can update contract")
|
|
}
|
|
|
|
contract.Call(interop.Hash160(management.Hash), "update",
|
|
contract.All, script, manifest, common.AppendVersion(data))
|
|
runtime.Log("netmap contract updated")
|
|
}
|
|
|
|
// InnerRingList method returns a slice of structures that contains the public key of
|
|
// an Inner Ring node. It should be used in notary disabled environment only.
|
|
//
|
|
// If notary is enabled, look to NeoFSAlphabet role in native RoleManagement
|
|
// contract of the sidechain.
|
|
func InnerRingList() []common.IRNode {
|
|
ctx := storage.GetReadOnlyContext()
|
|
pubs := getIRNodes(ctx)
|
|
nodes := []common.IRNode{}
|
|
for i := range pubs {
|
|
nodes = append(nodes, common.IRNode{PublicKey: pubs[i]})
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
// UpdateInnerRing method updates a list of Inner Ring node keys. It should be used
|
|
// only in notary disabled environment. It can be invoked only by Alphabet nodes.
|
|
//
|
|
// If notary is enabled, update NeoFSAlphabet role in native RoleManagement
|
|
// contract of the sidechain. Use notary service to collect multisignature.
|
|
func UpdateInnerRing(keys []interop.PublicKey) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
|
|
var ( // for invocation collection without notary
|
|
alphabet []interop.PublicKey
|
|
nodeKey []byte
|
|
)
|
|
|
|
if notaryDisabled {
|
|
alphabet = common.AlphabetNodes()
|
|
nodeKey = common.InnerRingInvoker(alphabet)
|
|
if len(nodeKey) == 0 {
|
|
panic("this method must be invoked by alphabet nodes")
|
|
}
|
|
} else {
|
|
multiaddr := common.AlphabetAddress()
|
|
common.CheckAlphabetWitness(multiaddr)
|
|
}
|
|
|
|
if notaryDisabled {
|
|
threshold := len(alphabet)*2/3 + 1
|
|
id := keysID(keys, []byte("updateIR"))
|
|
|
|
n := common.Vote(ctx, id, nodeKey)
|
|
if n < threshold {
|
|
return
|
|
}
|
|
|
|
common.RemoveVotes(ctx, id)
|
|
}
|
|
|
|
runtime.Log("inner ring list updated")
|
|
common.SetSerialized(ctx, innerRingKey, keys)
|
|
}
|
|
|
|
// AddPeerIR accepts Alphabet calls in the notary-enabled contract setting and
|
|
// behaves similar to AddPeer in the notary-disabled one.
|
|
//
|
|
// AddPeerIR MUST NOT be called in notary-disabled contract setting.
|
|
// AddPeerIR MUST be called by the Alphabet member only.
|
|
func AddPeerIR(nodeInfo []byte) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
if notaryDisabled {
|
|
panic("AddPeerIR should only be called in notary-enabled environment")
|
|
}
|
|
|
|
common.CheckAlphabetWitness(common.AlphabetAddress())
|
|
|
|
publicKey := nodeInfo[2:35] // V2 format: offset:2, len:33
|
|
|
|
addToNetmap(ctx, publicKey, Node{
|
|
BLOB: nodeInfo,
|
|
State: NodeStateOnline,
|
|
})
|
|
}
|
|
|
|
// AddPeer accepts information about the network map candidate in the NeoFS
|
|
// binary protocol format, identifies the caller and behaves depending on different
|
|
// conditions listed below.
|
|
//
|
|
// Contract settings:
|
|
//
|
|
// (1) notary-enabled
|
|
// (2) notary-disabled
|
|
//
|
|
// Callers:
|
|
//
|
|
// (a) candidate himself, if node's public key corresponds to the signer
|
|
// (b) Alphabet member
|
|
// (c) others
|
|
//
|
|
// AddPeer case-by-case behavior:
|
|
//
|
|
// (1a) does nothing
|
|
// (1b) panics. Notice that AddPeerIR MUST be used for this purpose.
|
|
// (2a) throws AddPeer notification with the provided BLOB
|
|
// (2b) accepts Alphabet vote. If the threshold of votes is reached, adds
|
|
// new element to the candidate set, and throws AddPeerSuccess notification.
|
|
// (c) panics
|
|
//
|
|
// Candidate MUST call AddPeer with "online" state in its descriptor. Alphabet
|
|
// members MUST NOT call AddPeer with any other states.
|
|
func AddPeer(nodeInfo []byte) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
|
|
var ( // for invocation collection without notary
|
|
alphabet []interop.PublicKey
|
|
nodeKey []byte
|
|
)
|
|
|
|
if notaryDisabled {
|
|
alphabet = common.AlphabetNodes()
|
|
nodeKey = common.InnerRingInvoker(alphabet)
|
|
}
|
|
|
|
// V2 format
|
|
publicKey := nodeInfo[2:35] // offset:2, len:33
|
|
|
|
// If notary is enabled or caller is not an alphabet node,
|
|
// just emit the notification for alphabet.
|
|
if !notaryDisabled || len(nodeKey) == 0 {
|
|
common.CheckWitness(publicKey)
|
|
if notaryDisabled {
|
|
runtime.Notify("AddPeer", nodeInfo)
|
|
}
|
|
return
|
|
}
|
|
|
|
candidate := Node{
|
|
BLOB: nodeInfo,
|
|
State: NodeStateOnline,
|
|
}
|
|
|
|
if notaryDisabled {
|
|
threshold := len(alphabet)*2/3 + 1
|
|
rawCandidate := std.Serialize(candidate)
|
|
id := crypto.Sha256(rawCandidate)
|
|
|
|
n := common.Vote(ctx, id, nodeKey)
|
|
if n < threshold {
|
|
return
|
|
}
|
|
|
|
common.RemoveVotes(ctx, id)
|
|
}
|
|
|
|
addToNetmap(ctx, publicKey, candidate)
|
|
}
|
|
|
|
// updates state of the network map candidate by its public key in the contract
|
|
// storage, and throws UpdateStateSuccess notification after this.
|
|
//
|
|
// State MUST be from the NodeState enum.
|
|
func updateCandidateState(ctx storage.Context, publicKey interop.PublicKey, state NodeState) {
|
|
switch state {
|
|
case NodeStateOffline:
|
|
removeFromNetmap(ctx, publicKey)
|
|
runtime.Log("remove storage node from the network map")
|
|
case NodeStateOnline, NodeStateMaintenance:
|
|
updateNetmapState(ctx, publicKey, state)
|
|
runtime.Log("update state of the network map candidate")
|
|
default:
|
|
panic("unsupported state")
|
|
}
|
|
|
|
runtime.Notify("UpdateStateSuccess", publicKey, state)
|
|
}
|
|
|
|
// UpdateState accepts new state to be assigned to network map candidate
|
|
// identified by the given public key, identifies the signer and behaves
|
|
// depending on different conditions listed below.
|
|
//
|
|
// Contract settings:
|
|
//
|
|
// (1) notary-enabled
|
|
// (2) notary-disabled
|
|
//
|
|
// Signers:
|
|
//
|
|
// (a) candidate himself only, if provided public key corresponds to the signer
|
|
// (b) Alphabet member only
|
|
// (ab) both candidate and Alphabet member
|
|
// (c) others
|
|
//
|
|
// UpdateState case-by-case behavior:
|
|
//
|
|
// (1a) panics
|
|
// (1b) like (1a)
|
|
// (1ab) updates candidate's state in the contract storage (*), and throws
|
|
// UpdateStateSuccess with the provided key and new state
|
|
// (2a) throws UpdateState notification with the provided key and new state
|
|
// (2b) accepts Alphabet vote. If the threshold of votes is reached, behaves
|
|
// like (1ab).
|
|
// (c) panics
|
|
//
|
|
// (*) Candidate is removed from the candidate set if state is NodeStateOffline.
|
|
// Any other state is written into candidate's descriptor in the contract storage.
|
|
// If requested candidate is missing, panic occurs. Throws UpdateStateSuccess
|
|
// notification on success.
|
|
//
|
|
// State MUST be from the NodeState enum. Public key MUST be
|
|
// interop.PublicKeyCompressedLen bytes.
|
|
func UpdateState(state NodeState, publicKey interop.PublicKey) {
|
|
if len(publicKey) != interop.PublicKeyCompressedLen {
|
|
panic("incorrect public key")
|
|
}
|
|
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
|
|
if notaryDisabled {
|
|
alphabet := common.AlphabetNodes()
|
|
nodeKey := common.InnerRingInvoker(alphabet)
|
|
|
|
// If caller is not an alphabet node,
|
|
// just emit the notification for alphabet.
|
|
if len(nodeKey) == 0 {
|
|
common.CheckWitness(publicKey)
|
|
runtime.Notify("UpdateState", state, publicKey)
|
|
return
|
|
}
|
|
|
|
threshold := len(alphabet)*2/3 + 1
|
|
id := common.InvokeID([]interface{}{state, publicKey}, []byte("update"))
|
|
|
|
n := common.Vote(ctx, id, nodeKey)
|
|
if n < threshold {
|
|
return
|
|
}
|
|
|
|
common.RemoveVotes(ctx, id)
|
|
} else {
|
|
common.CheckWitness(publicKey)
|
|
common.CheckAlphabetWitness(common.AlphabetAddress())
|
|
}
|
|
|
|
updateCandidateState(ctx, publicKey, state)
|
|
}
|
|
|
|
// UpdateStateIR accepts Alphabet calls in the notary-enabled contract setting
|
|
// and behaves similar to UpdateState, but does not require candidate's
|
|
// signature presence.
|
|
//
|
|
// UpdateStateIR MUST NOT be called in notary-disabled contract setting.
|
|
// UpdateStateIR MUST be called by the Alphabet member only.
|
|
func UpdateStateIR(state NodeState, publicKey interop.PublicKey) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
if notaryDisabled {
|
|
panic("UpdateStateIR should only be called in notary-enabled environment")
|
|
}
|
|
|
|
common.CheckAlphabetWitness(common.AlphabetAddress())
|
|
|
|
updateCandidateState(ctx, publicKey, state)
|
|
}
|
|
|
|
// NewEpoch method changes the epoch number up to the provided epochNum argument. It can
|
|
// be invoked only by Alphabet nodes. If provided epoch number is less than the
|
|
// current epoch number or equals it, the method throws panic.
|
|
//
|
|
// When epoch number is updated, the contract sets storage node candidates as the current
|
|
// network map. The contract also invokes NewEpoch method on Balance and Container
|
|
// contracts.
|
|
//
|
|
// It produces NewEpoch notification.
|
|
func NewEpoch(epochNum int) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
|
|
var ( // for invocation collection without notary
|
|
alphabet []interop.PublicKey
|
|
nodeKey []byte
|
|
)
|
|
|
|
if notaryDisabled {
|
|
alphabet = common.AlphabetNodes()
|
|
nodeKey = common.InnerRingInvoker(alphabet)
|
|
if len(nodeKey) == 0 {
|
|
panic("this method must be invoked by inner ring nodes")
|
|
}
|
|
} else {
|
|
multiaddr := common.AlphabetAddress()
|
|
common.CheckAlphabetWitness(multiaddr)
|
|
}
|
|
|
|
if notaryDisabled {
|
|
threshold := len(alphabet)*2/3 + 1
|
|
id := common.InvokeID([]interface{}{epochNum}, []byte("epoch"))
|
|
|
|
n := common.Vote(ctx, id, nodeKey)
|
|
if n < threshold {
|
|
return
|
|
}
|
|
|
|
common.RemoveVotes(ctx, id)
|
|
}
|
|
|
|
currentEpoch := storage.Get(ctx, snapshotEpoch).(int)
|
|
if epochNum <= currentEpoch {
|
|
panic("invalid epoch") // ignore invocations with invalid epoch
|
|
}
|
|
|
|
dataOnlineState := filterNetmap(ctx)
|
|
|
|
runtime.Log("process new epoch")
|
|
|
|
// todo: check if provided epoch number is bigger than current
|
|
storage.Put(ctx, snapshotEpoch, epochNum)
|
|
storage.Put(ctx, snapshotBlockKey, ledger.CurrentIndex())
|
|
|
|
id := storage.Get(ctx, snapshotCurrentIDKey).(int)
|
|
id = (id + 1) % getSnapshotCount(ctx)
|
|
storage.Put(ctx, snapshotCurrentIDKey, id)
|
|
|
|
// put netmap into actual snapshot
|
|
common.SetSerialized(ctx, snapshotKeyPrefix+string([]byte{byte(id)}), dataOnlineState)
|
|
|
|
// make clean up routines in other contracts
|
|
cleanup(ctx, epochNum)
|
|
|
|
runtime.Notify("NewEpoch", epochNum)
|
|
}
|
|
|
|
// Epoch method returns the current epoch number.
|
|
func Epoch() int {
|
|
ctx := storage.GetReadOnlyContext()
|
|
return storage.Get(ctx, snapshotEpoch).(int)
|
|
}
|
|
|
|
// LastEpochBlock method returns the block number when the current epoch was applied.
|
|
func LastEpochBlock() int {
|
|
ctx := storage.GetReadOnlyContext()
|
|
return storage.Get(ctx, snapshotBlockKey).(int)
|
|
}
|
|
|
|
// Netmap returns set of information about the storage nodes representing a network
|
|
// map in the current epoch.
|
|
//
|
|
// Current state of each node is represented in the State field. It MAY differ
|
|
// with the state encoded into BLOB field, in this case binary encoded state
|
|
// MUST NOT be processed.
|
|
func Netmap() []Node {
|
|
ctx := storage.GetReadOnlyContext()
|
|
id := storage.Get(ctx, snapshotCurrentIDKey).(int)
|
|
return getSnapshot(ctx, snapshotKeyPrefix+string([]byte{byte(id)}))
|
|
}
|
|
|
|
// NetmapCandidates returns set of information about the storage nodes
|
|
// representing candidates for the network map in the coming epoch.
|
|
//
|
|
// Current state of each node is represented in the State field. It MAY differ
|
|
// with the state encoded into BLOB field, in this case binary encoded state
|
|
// MUST NOT be processed.
|
|
func NetmapCandidates() []Node {
|
|
ctx := storage.GetReadOnlyContext()
|
|
return getNetmapNodes(ctx)
|
|
}
|
|
|
|
// Snapshot returns set of information about the storage nodes representing a network
|
|
// map in (current-diff)-th epoch.
|
|
//
|
|
// Diff MUST NOT be negative. Diff MUST be less than maximum number of network
|
|
// map snapshots stored in the contract. The limit is a contract setting,
|
|
// DefaultSnapshotCount by default. See UpdateSnapshotCount for details.
|
|
//
|
|
// Current state of each node is represented in the State field. It MAY differ
|
|
// with the state encoded into BLOB field, in this case binary encoded state
|
|
// MUST NOT be processed.
|
|
func Snapshot(diff int) []Node {
|
|
ctx := storage.GetReadOnlyContext()
|
|
count := getSnapshotCount(ctx)
|
|
if diff < 0 || count <= diff {
|
|
panic("incorrect diff")
|
|
}
|
|
|
|
id := storage.Get(ctx, snapshotCurrentIDKey).(int)
|
|
needID := (id - diff + count) % count
|
|
key := snapshotKeyPrefix + string([]byte{byte(needID)})
|
|
return getSnapshot(ctx, key)
|
|
}
|
|
|
|
func getSnapshotCount(ctx storage.Context) int {
|
|
return storage.Get(ctx, snapshotCountKey).(int)
|
|
}
|
|
|
|
// UpdateSnapshotCount updates the number of the stored snapshots.
|
|
// If a new number is less than the old one, old snapshots are removed.
|
|
// Otherwise, history is extended with empty snapshots, so
|
|
// `Snapshot` method can return invalid results for `diff = new-old` epochs
|
|
// until `diff` epochs have passed.
|
|
//
|
|
// Count MUST NOT be negative.
|
|
func UpdateSnapshotCount(count int) {
|
|
common.CheckAlphabetWitness(common.AlphabetAddress())
|
|
if count < 0 {
|
|
panic("count must be positive")
|
|
}
|
|
ctx := storage.GetContext()
|
|
curr := getSnapshotCount(ctx)
|
|
if curr == count {
|
|
panic("count has not changed")
|
|
}
|
|
storage.Put(ctx, snapshotCountKey, count)
|
|
|
|
id := storage.Get(ctx, snapshotCurrentIDKey).(int)
|
|
var delStart, delFinish int
|
|
if curr < count {
|
|
// Increase history size.
|
|
//
|
|
// Old state (N = count, K = curr, E = current index, C = current epoch)
|
|
// KEY INDEX: 0 | 1 | ... | E | E+1 | ... | K-1 | ... | N-1
|
|
// EPOCH : C-E | C-E+1 | ... | C | C-K+1 | ... | C-E-1 |
|
|
//
|
|
// New state:
|
|
// KEY INDEX: 0 | 1 | ... | E | E+1 | ... | K-1 | ... | N-1
|
|
// EPOCH : C-E | C-E+1 | ... | C | nil | ... | . | ... | C-E-1
|
|
//
|
|
// So we need to move tail snapshots N-K keys forward,
|
|
// i.e. from E+1 .. K to N-K+E+1 .. N
|
|
diff := count - curr
|
|
lower := diff + id + 1
|
|
for k := count - 1; k >= lower; k-- {
|
|
moveSnapshot(ctx, k-diff, k)
|
|
}
|
|
delStart, delFinish = id+1, id+1+diff
|
|
if curr < delFinish {
|
|
delFinish = curr
|
|
}
|
|
} else {
|
|
// Decrease history size.
|
|
//
|
|
// Old state (N = curr, K = count)
|
|
// KEY INDEX: 0 | 1 | ... K1 ... | E | E+1 | ... K2-1 ... | N-1
|
|
// EPOCH : C-E | C-E+1 | ... .. ... | C | C-N+1 | ... ... ... | C-E-1
|
|
var step, start int
|
|
if id < count {
|
|
// K2 case, move snapshots from E+1+N-K .. N-1 range to E+1 .. K-1
|
|
// New state:
|
|
// KEY INDEX: 0 | 1 | ... | E | E+1 | ... | K-1
|
|
// EPOCH : C-E | C-E+1 | ... | C | C-K+1 | ... | C-E-1
|
|
step = curr - count
|
|
start = id + 1
|
|
} else {
|
|
// New state:
|
|
// KEY INDEX: 0 | 1 | ... | K-1
|
|
// EPOCH : C-K+1 | C-K+2 | ... | C
|
|
// K1 case, move snapshots from E-K+1 .. E range to 0 .. K-1
|
|
// AND replace current id with K-1
|
|
step = id - count + 1
|
|
storage.Put(ctx, snapshotCurrentIDKey, count-1)
|
|
}
|
|
for k := start; k < count; k++ {
|
|
moveSnapshot(ctx, k+step, k)
|
|
}
|
|
delStart, delFinish = count, curr
|
|
}
|
|
for k := delStart; k < delFinish; k++ {
|
|
key := snapshotKeyPrefix + string([]byte{byte(k)})
|
|
storage.Delete(ctx, key)
|
|
}
|
|
}
|
|
|
|
func moveSnapshot(ctx storage.Context, from, to int) {
|
|
keyFrom := snapshotKeyPrefix + string([]byte{byte(from)})
|
|
keyTo := snapshotKeyPrefix + string([]byte{byte(to)})
|
|
data := storage.Get(ctx, keyFrom)
|
|
storage.Put(ctx, keyTo, data)
|
|
}
|
|
|
|
// SnapshotByEpoch returns set of information about the storage nodes representing
|
|
// a network map in the given epoch.
|
|
//
|
|
// Behaves like Snapshot: it is called after difference with the current epoch is
|
|
// calculated.
|
|
func SnapshotByEpoch(epoch int) []Node {
|
|
ctx := storage.GetReadOnlyContext()
|
|
currentEpoch := storage.Get(ctx, snapshotEpoch).(int)
|
|
|
|
return Snapshot(currentEpoch - epoch)
|
|
}
|
|
|
|
// Config returns configuration value of NeoFS configuration. If key does
|
|
// not exists, returns nil.
|
|
func Config(key []byte) interface{} {
|
|
ctx := storage.GetReadOnlyContext()
|
|
return getConfig(ctx, key)
|
|
}
|
|
|
|
// SetConfig key-value pair as a NeoFS runtime configuration value. It can be invoked
|
|
// only by Alphabet nodes.
|
|
func SetConfig(id, key, val []byte) {
|
|
ctx := storage.GetContext()
|
|
notaryDisabled := storage.Get(ctx, notaryDisabledKey).(bool)
|
|
|
|
var ( // for invocation collection without notary
|
|
alphabet []interop.PublicKey
|
|
nodeKey []byte
|
|
)
|
|
|
|
if notaryDisabled {
|
|
alphabet = common.AlphabetNodes()
|
|
nodeKey = common.InnerRingInvoker(alphabet)
|
|
if len(nodeKey) == 0 {
|
|
panic("invoked by non inner ring node")
|
|
}
|
|
} else {
|
|
multiaddr := common.AlphabetAddress()
|
|
common.CheckAlphabetWitness(multiaddr)
|
|
}
|
|
|
|
if notaryDisabled {
|
|
threshold := len(alphabet)*2/3 + 1
|
|
|
|
n := common.Vote(ctx, id, nodeKey)
|
|
if n < threshold {
|
|
return
|
|
}
|
|
|
|
common.RemoveVotes(ctx, id)
|
|
}
|
|
|
|
setConfig(ctx, key, val)
|
|
|
|
runtime.Log("configuration has been updated")
|
|
}
|
|
|
|
type record struct {
|
|
key []byte
|
|
val []byte
|
|
}
|
|
|
|
// ListConfig returns an array of structures that contain key and value of all
|
|
// NeoFS configuration records. Key and value are both byte arrays.
|
|
func ListConfig() []record {
|
|
ctx := storage.GetReadOnlyContext()
|
|
|
|
var config []record
|
|
|
|
it := storage.Find(ctx, configPrefix, storage.None)
|
|
for iterator.Next(it) {
|
|
pair := iterator.Value(it).(struct {
|
|
key []byte
|
|
val []byte
|
|
})
|
|
r := record{key: pair.key[len(configPrefix):], val: pair.val}
|
|
|
|
config = append(config, r)
|
|
}
|
|
|
|
return config
|
|
}
|
|
|
|
// Version returns the version of the contract.
|
|
func Version() int {
|
|
return common.Version
|
|
}
|
|
|
|
// serializes and stores the given Node by its public key in the contract storage,
|
|
// and throws AddPeerSuccess notification after this.
|
|
//
|
|
// Public key MUST match the one encoded in BLOB field.
|
|
func addToNetmap(ctx storage.Context, publicKey []byte, node Node) {
|
|
storageKey := append(candidatePrefix, publicKey...)
|
|
storage.Put(ctx, storageKey, std.Serialize(node))
|
|
|
|
runtime.Notify("AddPeerSuccess", interop.PublicKey(publicKey))
|
|
}
|
|
|
|
func removeFromNetmap(ctx storage.Context, key interop.PublicKey) {
|
|
storageKey := append(candidatePrefix, key...)
|
|
storage.Delete(ctx, storageKey)
|
|
}
|
|
|
|
func updateNetmapState(ctx storage.Context, key interop.PublicKey, state NodeState) {
|
|
storageKey := append(candidatePrefix, key...)
|
|
raw := storage.Get(ctx, storageKey).([]byte)
|
|
if raw == nil {
|
|
panic("peer is missing")
|
|
}
|
|
node := std.Deserialize(raw).(Node)
|
|
node.State = state
|
|
storage.Put(ctx, storageKey, std.Serialize(node))
|
|
}
|
|
|
|
func filterNetmap(ctx storage.Context) []Node {
|
|
var (
|
|
netmap = getNetmapNodes(ctx)
|
|
result = []Node{}
|
|
)
|
|
|
|
for i := 0; i < len(netmap); i++ {
|
|
item := netmap[i]
|
|
if item.State != NodeStateOffline {
|
|
result = append(result, item)
|
|
}
|
|
}
|
|
|
|
return result
|
|
}
|
|
|
|
func getNetmapNodes(ctx storage.Context) []Node {
|
|
result := []Node{}
|
|
|
|
it := storage.Find(ctx, candidatePrefix, storage.ValuesOnly|storage.DeserializeValues)
|
|
for iterator.Next(it) {
|
|
node := iterator.Value(it).(Node)
|
|
result = append(result, node)
|
|
}
|
|
|
|
return result
|
|
}
|
|
|
|
func getSnapshot(ctx storage.Context, key string) []Node {
|
|
data := storage.Get(ctx, key)
|
|
if data != nil {
|
|
return std.Deserialize(data.([]byte)).([]Node)
|
|
}
|
|
|
|
return []Node{}
|
|
}
|
|
|
|
func getConfig(ctx storage.Context, key interface{}) interface{} {
|
|
postfix := key.([]byte)
|
|
storageKey := append(configPrefix, postfix...)
|
|
|
|
return storage.Get(ctx, storageKey)
|
|
}
|
|
|
|
func setConfig(ctx storage.Context, key, val interface{}) {
|
|
postfix := key.([]byte)
|
|
storageKey := append(configPrefix, postfix...)
|
|
|
|
storage.Put(ctx, storageKey, val)
|
|
}
|
|
|
|
func cleanup(ctx storage.Context, epoch int) {
|
|
balanceContractAddr := storage.Get(ctx, balanceContractKey).(interop.Hash160)
|
|
contract.Call(balanceContractAddr, cleanupEpochMethod, contract.All, epoch)
|
|
|
|
containerContractAddr := storage.Get(ctx, containerContractKey).(interop.Hash160)
|
|
contract.Call(containerContractAddr, cleanupEpochMethod, contract.All, epoch)
|
|
}
|
|
|
|
func getIRNodes(ctx storage.Context) []interop.PublicKey {
|
|
data := storage.Get(ctx, innerRingKey)
|
|
if data != nil {
|
|
return std.Deserialize(data.([]byte)).([]interop.PublicKey)
|
|
}
|
|
|
|
return []interop.PublicKey{}
|
|
}
|
|
|
|
func keysID(args []interop.PublicKey, prefix []byte) []byte {
|
|
var (
|
|
result []byte
|
|
)
|
|
|
|
result = append(result, prefix...)
|
|
|
|
for i := range args {
|
|
result = append(result, args[i]...)
|
|
}
|
|
|
|
return crypto.Sha256(result)
|
|
}
|