forked from TrueCloudLab/frostfs-node
e81081e0e0
`Register` was renamed to `AddPeerIR` for consistency with `UpdateState` changes in https://github.com/nspcc-dev/neofs-contract/pull/227 This is protocol breaking change for notary enabled environment. Luckily, there is no notary enabled environments anywhere except of neofs-dev-env, so we can do such thing. We should avoid such changes in the future, though. Signed-off-by: Alex Vanin <alexey@nspcc.ru>
224 lines
5.8 KiB
Go
224 lines
5.8 KiB
Go
package netmap
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"sort"
|
|
"strings"
|
|
|
|
netmapclient "github.com/nspcc-dev/neofs-node/pkg/morph/client/netmap"
|
|
netmapEvent "github.com/nspcc-dev/neofs-node/pkg/morph/event/netmap"
|
|
subnetEvent "github.com/nspcc-dev/neofs-node/pkg/morph/event/subnet"
|
|
"github.com/nspcc-dev/neofs-sdk-go/netmap"
|
|
subnetid "github.com/nspcc-dev/neofs-sdk-go/subnet/id"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// Process add peer notification by sanity check of new node
|
|
// local epoch timer.
|
|
func (np *Processor) processAddPeer(ev netmapEvent.AddPeer) {
|
|
if !np.alphabetState.IsAlphabet() {
|
|
np.log.Info("non alphabet mode, ignore new peer notification")
|
|
return
|
|
}
|
|
|
|
// check if notary transaction is valid, see #976
|
|
if originalRequest := ev.NotaryRequest(); originalRequest != nil {
|
|
tx := originalRequest.MainTransaction
|
|
ok, err := np.netmapClient.Morph().IsValidScript(tx.Script, tx.Signers)
|
|
if err != nil || !ok {
|
|
np.log.Warn("non-halt notary transaction",
|
|
zap.String("method", "netmap.AddPeer"),
|
|
zap.String("hash", tx.Hash().StringLE()),
|
|
zap.Error(err))
|
|
return
|
|
}
|
|
}
|
|
|
|
// unmarshal node info
|
|
nodeInfo := netmap.NewNodeInfo()
|
|
if err := nodeInfo.Unmarshal(ev.Node()); err != nil {
|
|
// it will be nice to have tx id at event structure to log it
|
|
np.log.Warn("can't parse network map candidate")
|
|
return
|
|
}
|
|
|
|
// validate and update node info
|
|
err := np.nodeValidator.VerifyAndUpdate(nodeInfo)
|
|
if err != nil {
|
|
np.log.Warn("could not verify and update information about network map candidate",
|
|
zap.String("error", err.Error()),
|
|
)
|
|
|
|
return
|
|
}
|
|
|
|
// sort attributes to make it consistent
|
|
a := nodeInfo.Attributes()
|
|
sort.Slice(a, func(i, j int) bool {
|
|
switch strings.Compare(a[i].Key(), a[j].Key()) {
|
|
case -1:
|
|
return true
|
|
case 1:
|
|
return false
|
|
default:
|
|
return a[i].Value() < a[j].Value()
|
|
}
|
|
})
|
|
nodeInfo.SetAttributes(a...)
|
|
|
|
// marshal updated node info structure
|
|
nodeInfoBinary, err := nodeInfo.Marshal()
|
|
if err != nil {
|
|
np.log.Warn("could not marshal updated network map candidate",
|
|
zap.String("error", err.Error()),
|
|
)
|
|
|
|
return
|
|
}
|
|
|
|
keyString := hex.EncodeToString(nodeInfo.PublicKey())
|
|
|
|
updated := np.netmapSnapshot.touch(keyString, np.epochState.EpochCounter(), nodeInfoBinary)
|
|
|
|
if updated {
|
|
np.log.Info("approving network map candidate",
|
|
zap.String("key", keyString))
|
|
|
|
prm := netmapclient.AddPeerPrm{}
|
|
prm.SetNodeInfo(nodeInfo)
|
|
|
|
// In notary environments we call AddPeerIR method instead of AddPeer.
|
|
// It differs from AddPeer only by name, so we can do this in the same form.
|
|
// See https://github.com/nspcc-dev/neofs-contract/issues/154.
|
|
const methodAddPeerNotary = "addPeerIR"
|
|
|
|
if nr := ev.NotaryRequest(); nr != nil {
|
|
// create new notary request with the original nonce
|
|
err = np.netmapClient.Morph().NotaryInvoke(
|
|
np.netmapClient.ContractAddress(),
|
|
0,
|
|
nr.MainTransaction.Nonce,
|
|
nil,
|
|
methodAddPeerNotary,
|
|
nodeInfoBinary,
|
|
)
|
|
} else {
|
|
// notification event case
|
|
err = np.netmapClient.AddPeer(prm)
|
|
}
|
|
|
|
if err != nil {
|
|
np.log.Error("can't invoke netmap.AddPeer", zap.Error(err))
|
|
}
|
|
}
|
|
}
|
|
|
|
// Process update peer notification by sending approval tx to the smart contract.
|
|
func (np *Processor) processUpdatePeer(ev netmapEvent.UpdatePeer) {
|
|
if !np.alphabetState.IsAlphabet() {
|
|
np.log.Info("non alphabet mode, ignore update peer notification")
|
|
return
|
|
}
|
|
|
|
// better use unified enum from neofs-api-go/v2/netmap package
|
|
if ev.Status() != netmap.NodeStateOffline {
|
|
np.log.Warn("node proposes unknown state",
|
|
zap.String("key", hex.EncodeToString(ev.PublicKey().Bytes())),
|
|
zap.Stringer("status", ev.Status()),
|
|
)
|
|
return
|
|
}
|
|
|
|
// flag node to remove from local view, so it can be re-bootstrapped
|
|
// again before new epoch will tick
|
|
np.netmapSnapshot.flag(hex.EncodeToString(ev.PublicKey().Bytes()))
|
|
|
|
var err error
|
|
|
|
if nr := ev.NotaryRequest(); nr != nil {
|
|
err = np.netmapClient.Morph().NotarySignAndInvokeTX(nr.MainTransaction)
|
|
} else {
|
|
prm := netmapclient.UpdatePeerPrm{}
|
|
|
|
prm.SetState(ev.Status())
|
|
prm.SetKey(ev.PublicKey().Bytes())
|
|
|
|
err = np.netmapClient.UpdatePeerState(prm)
|
|
}
|
|
if err != nil {
|
|
np.log.Error("can't invoke netmap.UpdatePeer", zap.Error(err))
|
|
}
|
|
}
|
|
|
|
func (np *Processor) processRemoveSubnetNode(ev subnetEvent.RemoveNode) {
|
|
if !np.alphabetState.IsAlphabet() {
|
|
np.log.Info("non alphabet mode, ignore remove node from subnet notification")
|
|
return
|
|
}
|
|
|
|
candidates, err := np.netmapClient.GetCandidates()
|
|
if err != nil {
|
|
np.log.Warn("could not get network map candidates",
|
|
zap.Error(err),
|
|
)
|
|
return
|
|
}
|
|
|
|
rawSubnet := ev.SubnetworkID()
|
|
subnetToRemoveFrom := &subnetid.ID{}
|
|
|
|
err = subnetToRemoveFrom.Unmarshal(rawSubnet)
|
|
if err != nil {
|
|
np.log.Warn("could not unmarshal subnet id",
|
|
zap.Error(err),
|
|
)
|
|
return
|
|
}
|
|
|
|
if subnetid.IsZero(*subnetToRemoveFrom) {
|
|
np.log.Warn("got zero subnet in remove node notification")
|
|
return
|
|
}
|
|
|
|
for _, node := range candidates.Nodes {
|
|
if !bytes.Equal(node.NodeInfo.PublicKey(), ev.Node()) {
|
|
continue
|
|
}
|
|
|
|
err = node.IterateSubnets(func(subNetID subnetid.ID) error {
|
|
if subNetID.Equals(subnetToRemoveFrom) {
|
|
return netmap.ErrRemoveSubnet
|
|
}
|
|
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
np.log.Warn("could not iterate over subnetworks of the node", zap.Error(err))
|
|
np.log.Info("vote to remove node from netmap", zap.String("key", hex.EncodeToString(ev.Node())))
|
|
|
|
prm := netmapclient.UpdatePeerPrm{}
|
|
prm.SetKey(ev.Node())
|
|
prm.SetState(netmap.NodeStateOffline)
|
|
prm.SetHash(ev.TxHash())
|
|
|
|
err = np.netmapClient.UpdatePeerState(prm)
|
|
if err != nil {
|
|
np.log.Error("could not invoke netmap.UpdateState", zap.Error(err))
|
|
return
|
|
}
|
|
} else {
|
|
prm := netmapclient.AddPeerPrm{}
|
|
prm.SetNodeInfo(node.NodeInfo)
|
|
prm.SetHash(ev.TxHash())
|
|
|
|
err = np.netmapClient.AddPeer(prm)
|
|
if err != nil {
|
|
np.log.Error("could not invoke netmap.AddPeer", zap.Error(err))
|
|
return
|
|
}
|
|
}
|
|
|
|
break
|
|
}
|
|
}
|