2021-05-25 08:48:01 +00:00
|
|
|
package pool
|
|
|
|
|
|
|
|
import (
|
2022-02-07 20:27:56 +00:00
|
|
|
"bytes"
|
2021-05-25 08:48:01 +00:00
|
|
|
"context"
|
|
|
|
"crypto/ecdsa"
|
2021-11-17 11:22:32 +00:00
|
|
|
"crypto/sha256"
|
2021-05-25 08:48:01 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2021-12-29 14:40:37 +00:00
|
|
|
"io"
|
2021-10-25 12:57:55 +00:00
|
|
|
"math"
|
2021-05-25 08:48:01 +00:00
|
|
|
"math/rand"
|
2021-11-16 13:50:33 +00:00
|
|
|
"sort"
|
2021-10-25 12:57:55 +00:00
|
|
|
"strings"
|
2021-05-25 08:48:01 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2021-12-10 13:56:04 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
2021-12-29 14:40:37 +00:00
|
|
|
apiclient "github.com/nspcc-dev/neofs-api-go/v2/rpc/client"
|
2021-12-17 10:36:07 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/accounting"
|
2021-11-09 08:20:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/client"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/container"
|
|
|
|
cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/eacl"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/object"
|
2022-02-07 20:27:56 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/object/address"
|
2022-01-25 16:20:32 +00:00
|
|
|
oid "github.com/nspcc-dev/neofs-sdk-go/object/id"
|
2021-11-09 08:20:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/owner"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/session"
|
2021-11-15 06:35:30 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/token"
|
2021-09-07 14:34:20 +00:00
|
|
|
"go.uber.org/zap"
|
2021-05-25 08:48:01 +00:00
|
|
|
)
|
|
|
|
|
2021-07-20 08:02:14 +00:00
|
|
|
// Client is a wrapper for client.Client to generate mock.
|
|
|
|
type Client interface {
|
2021-12-02 12:21:54 +00:00
|
|
|
GetBalance(context.Context, client.GetBalancePrm) (*client.GetBalanceRes, error)
|
|
|
|
PutContainer(context.Context, client.ContainerPutPrm) (*client.ContainerPutRes, error)
|
|
|
|
GetContainer(context.Context, client.ContainerGetPrm) (*client.ContainerGetRes, error)
|
|
|
|
ListContainers(context.Context, client.ContainerListPrm) (*client.ContainerListRes, error)
|
|
|
|
DeleteContainer(context.Context, client.ContainerDeletePrm) (*client.ContainerDeleteRes, error)
|
|
|
|
EACL(context.Context, client.EACLPrm) (*client.EACLRes, error)
|
|
|
|
SetEACL(context.Context, client.SetEACLPrm) (*client.SetEACLRes, error)
|
|
|
|
AnnounceContainerUsedSpace(context.Context, client.AnnounceSpacePrm) (*client.AnnounceSpaceRes, error)
|
|
|
|
EndpointInfo(context.Context, client.EndpointInfoPrm) (*client.EndpointInfoRes, error)
|
|
|
|
NetworkInfo(context.Context, client.NetworkInfoPrm) (*client.NetworkInfoRes, error)
|
2022-02-07 20:27:56 +00:00
|
|
|
ObjectPutInit(context.Context, client.PrmObjectPutInit) (*client.ObjectWriter, error)
|
2021-12-29 14:40:37 +00:00
|
|
|
DeleteObject(context.Context, *client.DeleteObjectParams, ...client.CallOption) (*client.ObjectDeleteRes, error)
|
2022-02-07 20:27:56 +00:00
|
|
|
ObjectGetInit(context.Context, client.PrmObjectGet) (*client.ObjectReader, error)
|
2021-12-29 14:40:37 +00:00
|
|
|
HeadObject(context.Context, *client.ObjectHeaderParams, ...client.CallOption) (*client.ObjectHeadRes, error)
|
|
|
|
ObjectPayloadRangeData(context.Context, *client.RangeDataParams, ...client.CallOption) (*client.ObjectRangeRes, error)
|
|
|
|
HashObjectPayloadRanges(context.Context, *client.RangeChecksumParams, ...client.CallOption) (*client.ObjectRangeHashRes, error)
|
|
|
|
SearchObjects(context.Context, *client.SearchObjectParams, ...client.CallOption) (*client.ObjectSearchRes, error)
|
2021-12-02 12:21:54 +00:00
|
|
|
AnnounceLocalTrust(context.Context, client.AnnounceLocalTrustPrm) (*client.AnnounceLocalTrustRes, error)
|
|
|
|
AnnounceIntermediateTrust(context.Context, client.AnnounceIntermediateTrustPrm) (*client.AnnounceIntermediateTrustRes, error)
|
|
|
|
CreateSession(context.Context, client.CreateSessionPrm) (*client.CreateSessionRes, error)
|
2021-12-29 14:40:37 +00:00
|
|
|
|
|
|
|
Raw() *apiclient.Client
|
|
|
|
|
|
|
|
Conn() io.Closer
|
2021-07-20 08:02:14 +00:00
|
|
|
}
|
|
|
|
|
2021-05-25 11:46:58 +00:00
|
|
|
// BuilderOptions contains options used to build connection pool.
|
|
|
|
type BuilderOptions struct {
|
2022-02-02 13:25:36 +00:00
|
|
|
Key *ecdsa.PrivateKey
|
|
|
|
Logger *zap.Logger
|
|
|
|
NodeConnectionTimeout time.Duration
|
|
|
|
NodeRequestTimeout time.Duration
|
|
|
|
ClientRebalanceInterval time.Duration
|
2022-02-02 11:21:23 +00:00
|
|
|
SessionTokenThreshold time.Duration
|
2022-02-02 13:25:36 +00:00
|
|
|
SessionExpirationDuration uint64
|
|
|
|
nodesParams []*NodesParam
|
|
|
|
clientBuilder func(opts ...client.Option) (Client, error)
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
type NodesParam struct {
|
|
|
|
priority int
|
|
|
|
addresses []string
|
|
|
|
weights []float64
|
|
|
|
}
|
|
|
|
|
|
|
|
type NodeParam struct {
|
|
|
|
priority int
|
|
|
|
address string
|
|
|
|
weight float64
|
|
|
|
}
|
|
|
|
|
2021-05-25 11:46:58 +00:00
|
|
|
// Builder is an interim structure used to collect node addresses/weights and
|
2021-05-25 08:48:01 +00:00
|
|
|
// build connection pool subsequently.
|
2021-05-25 11:46:58 +00:00
|
|
|
type Builder struct {
|
2021-11-16 13:50:33 +00:00
|
|
|
nodeParams []NodeParam
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
2021-06-22 09:15:21 +00:00
|
|
|
// ContainerPollingParams contains parameters used in polling is a container created or not.
|
|
|
|
type ContainerPollingParams struct {
|
|
|
|
CreationTimeout time.Duration
|
|
|
|
PollInterval time.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultPollingParams creates ContainerPollingParams with default values.
|
|
|
|
func DefaultPollingParams() *ContainerPollingParams {
|
|
|
|
return &ContainerPollingParams{
|
|
|
|
CreationTimeout: 120 * time.Second,
|
|
|
|
PollInterval: 5 * time.Second,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-25 08:48:01 +00:00
|
|
|
// AddNode adds address/weight pair to node PoolBuilder list.
|
2021-11-16 13:50:33 +00:00
|
|
|
func (pb *Builder) AddNode(address string, priority int, weight float64) *Builder {
|
|
|
|
pb.nodeParams = append(pb.nodeParams, NodeParam{
|
|
|
|
address: address,
|
|
|
|
priority: priority,
|
|
|
|
weight: weight,
|
|
|
|
})
|
2021-05-25 08:48:01 +00:00
|
|
|
return pb
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build creates new pool based on current PoolBuilder state and options.
|
2021-05-25 11:46:58 +00:00
|
|
|
func (pb *Builder) Build(ctx context.Context, options *BuilderOptions) (Pool, error) {
|
2021-11-16 13:50:33 +00:00
|
|
|
if len(pb.nodeParams) == 0 {
|
2021-05-25 08:48:01 +00:00
|
|
|
return nil, errors.New("no NeoFS peers configured")
|
|
|
|
}
|
2021-06-09 11:56:11 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
nodesParams := make(map[int]*NodesParam)
|
|
|
|
for _, param := range pb.nodeParams {
|
|
|
|
nodes, ok := nodesParams[param.priority]
|
|
|
|
if !ok {
|
|
|
|
nodes = &NodesParam{priority: param.priority}
|
|
|
|
}
|
|
|
|
nodes.addresses = append(nodes.addresses, param.address)
|
|
|
|
nodes.weights = append(nodes.weights, param.weight)
|
|
|
|
nodesParams[param.priority] = nodes
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, nodes := range nodesParams {
|
|
|
|
nodes.weights = adjustWeights(nodes.weights)
|
|
|
|
options.nodesParams = append(options.nodesParams, nodes)
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Slice(options.nodesParams, func(i, j int) bool {
|
|
|
|
return options.nodesParams[i].priority < options.nodesParams[j].priority
|
|
|
|
})
|
2021-07-20 08:02:14 +00:00
|
|
|
|
|
|
|
if options.clientBuilder == nil {
|
2021-12-29 14:40:37 +00:00
|
|
|
options.clientBuilder = func(opts ...client.Option) (Client, error) {
|
|
|
|
return client.New(opts...)
|
|
|
|
}
|
2021-07-20 08:02:14 +00:00
|
|
|
}
|
|
|
|
|
2021-05-28 20:12:58 +00:00
|
|
|
return newPool(ctx, options)
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pool is an interface providing connection artifacts on request.
|
|
|
|
type Pool interface {
|
2021-11-15 06:35:30 +00:00
|
|
|
Object
|
|
|
|
Container
|
2021-12-17 10:36:07 +00:00
|
|
|
Accounting
|
2021-12-29 14:40:37 +00:00
|
|
|
Connection() (Client, *session.Token, error)
|
2021-05-28 20:12:58 +00:00
|
|
|
OwnerID() *owner.ID
|
2021-06-22 14:28:12 +00:00
|
|
|
WaitForContainerPresence(context.Context, *cid.ID, *ContainerPollingParams) error
|
[#48] pool: add `Close` method
Fix occasional panic in tests:
```
> for i in (seq 1 100); go test -race -count=1 ./pool/... ; end
...
{"level":"warn","ts":1635251466.567485,"caller":"pool/pool.go:122","msg":"failed to create neofs session token for client","address":"peer0","error":"error session"}
panic: Fail in goroutine after TestTwoNodes has completed
goroutine 6 [running]:
testing.(*common).Fail(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:710 +0x1b4
testing.(*common).FailNow(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:732 +0x2f
testing.(*common).Fatalf(0xc000074070, {0xd9d816, 0x2e}, {0xc000094050, 0x5, 0x5})
/usr/lib/go/src/testing/testing.go:830 +0x85
github.com/golang/mock/gomock.(*Controller).Call.func1(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:231 +0x44d
github.com/golang/mock/gomock.(*Controller).Call(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:247 +0xce
github.com/nspcc-dev/neofs-sdk-go/pool.(*MockClient).EndpointInfo(0xc0002dac30, {0xe85528, 0xc00008a120}, {0x0, 0x0, 0x0})
/home/dzeta/repo/neofs-sdk-go/pool/mock_test.go:186 +0x298
github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth.func1(0x1, {0xe950d8, 0xc0002dac30})
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:183 +0x188
created by github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:174 +0x233
```
Signed-off-by: Evgenii Stratonikov <evgeniy@nspcc.ru>
2021-10-26 12:36:08 +00:00
|
|
|
Close()
|
2021-11-15 06:35:30 +00:00
|
|
|
}
|
2021-10-25 12:57:55 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
type Object interface {
|
2022-02-07 20:27:56 +00:00
|
|
|
PutObject(ctx context.Context, hdr object.Object, payload io.Reader, opts ...CallOption) (*oid.ID, error)
|
2021-11-15 06:35:30 +00:00
|
|
|
DeleteObject(ctx context.Context, params *client.DeleteObjectParams, opts ...CallOption) error
|
2022-02-07 20:27:56 +00:00
|
|
|
GetObject(ctx context.Context, addr address.Address, opts ...CallOption) (*ResGetObject, error)
|
2021-11-15 06:35:30 +00:00
|
|
|
GetObjectHeader(ctx context.Context, params *client.ObjectHeaderParams, opts ...CallOption) (*object.Object, error)
|
|
|
|
ObjectPayloadRangeData(ctx context.Context, params *client.RangeDataParams, opts ...CallOption) ([]byte, error)
|
|
|
|
ObjectPayloadRangeSHA256(ctx context.Context, params *client.RangeChecksumParams, opts ...CallOption) ([][32]byte, error)
|
|
|
|
ObjectPayloadRangeTZ(ctx context.Context, params *client.RangeChecksumParams, opts ...CallOption) ([][64]byte, error)
|
2022-01-25 16:20:32 +00:00
|
|
|
SearchObject(ctx context.Context, params *client.SearchObjectParams, opts ...CallOption) ([]*oid.ID, error)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
type Container interface {
|
|
|
|
PutContainer(ctx context.Context, cnr *container.Container, opts ...CallOption) (*cid.ID, error)
|
|
|
|
GetContainer(ctx context.Context, cid *cid.ID, opts ...CallOption) (*container.Container, error)
|
|
|
|
ListContainers(ctx context.Context, ownerID *owner.ID, opts ...CallOption) ([]*cid.ID, error)
|
|
|
|
DeleteContainer(ctx context.Context, cid *cid.ID, opts ...CallOption) error
|
2021-11-17 11:22:32 +00:00
|
|
|
GetEACL(ctx context.Context, cid *cid.ID, opts ...CallOption) (*eacl.Table, error)
|
2021-11-15 06:35:30 +00:00
|
|
|
SetEACL(ctx context.Context, table *eacl.Table, opts ...CallOption) error
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
2021-12-17 10:36:07 +00:00
|
|
|
type Accounting interface {
|
|
|
|
Balance(ctx context.Context, owner *owner.ID, opts ...CallOption) (*accounting.Decimal, error)
|
|
|
|
}
|
|
|
|
|
2021-05-25 08:48:01 +00:00
|
|
|
type clientPack struct {
|
2021-12-29 14:40:37 +00:00
|
|
|
client Client
|
2021-10-25 12:57:55 +00:00
|
|
|
healthy bool
|
|
|
|
address string
|
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
type CallOption func(config *callConfig)
|
|
|
|
|
|
|
|
type callConfig struct {
|
2021-12-16 15:46:38 +00:00
|
|
|
isRetry bool
|
|
|
|
useDefaultSession bool
|
2021-10-25 12:57:55 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
key *ecdsa.PrivateKey
|
|
|
|
btoken *token.BearerToken
|
|
|
|
stoken *session.Token
|
|
|
|
}
|
|
|
|
|
|
|
|
func WithKey(key *ecdsa.PrivateKey) CallOption {
|
|
|
|
return func(config *callConfig) {
|
|
|
|
config.key = key
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func WithBearer(token *token.BearerToken) CallOption {
|
|
|
|
return func(config *callConfig) {
|
|
|
|
config.btoken = token
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func WithSession(token *session.Token) CallOption {
|
|
|
|
return func(config *callConfig) {
|
|
|
|
config.stoken = token
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func retry() CallOption {
|
|
|
|
return func(config *callConfig) {
|
|
|
|
config.isRetry = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-16 15:46:38 +00:00
|
|
|
func useDefaultSession() CallOption {
|
|
|
|
return func(config *callConfig) {
|
|
|
|
config.useDefaultSession = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func cfgFromOpts(opts ...CallOption) *callConfig {
|
|
|
|
var cfg = new(callConfig)
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt(cfg)
|
|
|
|
}
|
|
|
|
return cfg
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
2021-06-15 07:46:44 +00:00
|
|
|
var _ Pool = (*pool)(nil)
|
|
|
|
|
2021-05-25 08:48:01 +00:00
|
|
|
type pool struct {
|
2022-02-02 11:21:23 +00:00
|
|
|
innerPools []*innerPool
|
|
|
|
key *ecdsa.PrivateKey
|
|
|
|
owner *owner.ID
|
|
|
|
cancel context.CancelFunc
|
|
|
|
closedCh chan struct{}
|
|
|
|
cache *SessionCache
|
|
|
|
stokenDuration uint64
|
|
|
|
stokenThreshold time.Duration
|
2021-11-16 13:50:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type innerPool struct {
|
2021-05-25 08:48:01 +00:00
|
|
|
lock sync.RWMutex
|
|
|
|
sampler *Sampler
|
|
|
|
clientPacks []*clientPack
|
|
|
|
}
|
|
|
|
|
2022-02-02 11:21:23 +00:00
|
|
|
const (
|
2022-02-11 14:40:09 +00:00
|
|
|
defaultSessionTokenExpirationDuration = 100 // in blocks
|
|
|
|
|
|
|
|
defaultSessionTokenThreshold = 5 * time.Second
|
2022-02-02 11:21:23 +00:00
|
|
|
)
|
2022-02-02 13:45:01 +00:00
|
|
|
|
2021-05-28 20:12:58 +00:00
|
|
|
func newPool(ctx context.Context, options *BuilderOptions) (Pool, error) {
|
2021-11-08 13:28:28 +00:00
|
|
|
cache, err := NewCache()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("couldn't create cache: %w", err)
|
|
|
|
}
|
2021-10-25 12:57:55 +00:00
|
|
|
|
2022-02-10 12:59:31 +00:00
|
|
|
if options.SessionExpirationDuration == 0 {
|
2022-02-11 14:40:09 +00:00
|
|
|
options.SessionExpirationDuration = defaultSessionTokenExpirationDuration
|
2022-02-10 12:59:31 +00:00
|
|
|
}
|
|
|
|
|
2022-02-02 11:21:23 +00:00
|
|
|
if options.SessionTokenThreshold <= 0 {
|
2022-02-11 14:40:09 +00:00
|
|
|
options.SessionTokenThreshold = defaultSessionTokenThreshold
|
2022-02-02 11:21:23 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 13:16:35 +00:00
|
|
|
ownerID := owner.NewIDFromPublicKey(&options.Key.PublicKey)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
inner := make([]*innerPool, len(options.nodesParams))
|
2021-09-07 14:34:20 +00:00
|
|
|
var atLeastOneHealthy bool
|
2021-12-02 12:21:54 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
for i, params := range options.nodesParams {
|
|
|
|
clientPacks := make([]*clientPack, len(params.weights))
|
2022-02-07 20:27:56 +00:00
|
|
|
for j, addr := range params.addresses {
|
2021-11-16 13:50:33 +00:00
|
|
|
c, err := options.clientBuilder(client.WithDefaultPrivateKey(options.Key),
|
2022-02-07 20:27:56 +00:00
|
|
|
client.WithURIAddress(addr, nil),
|
2022-01-11 17:17:31 +00:00
|
|
|
client.WithDialTimeout(options.NodeConnectionTimeout),
|
|
|
|
client.WithNeoFSErrorParsing())
|
2021-11-16 13:50:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
var healthy bool
|
2022-02-02 13:25:36 +00:00
|
|
|
cliRes, err := createSessionTokenForDuration(ctx, c, options.SessionExpirationDuration)
|
2021-11-16 13:50:33 +00:00
|
|
|
if err != nil && options.Logger != nil {
|
|
|
|
options.Logger.Warn("failed to create neofs session token for client",
|
2022-02-07 20:27:56 +00:00
|
|
|
zap.String("address", addr),
|
2021-11-16 13:50:33 +00:00
|
|
|
zap.Error(err))
|
|
|
|
} else if err == nil {
|
|
|
|
healthy, atLeastOneHealthy = true, true
|
|
|
|
st := sessionTokenForOwner(ownerID, cliRes)
|
2022-02-07 20:27:56 +00:00
|
|
|
_ = cache.Put(formCacheKey(addr, options.Key), st)
|
2021-11-16 13:50:33 +00:00
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
clientPacks[j] = &clientPack{client: c, healthy: healthy, address: addr}
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-11-16 13:50:33 +00:00
|
|
|
source := rand.NewSource(time.Now().UnixNano())
|
|
|
|
sampler := NewSampler(params.weights, source)
|
|
|
|
|
|
|
|
inner[i] = &innerPool{
|
|
|
|
sampler: sampler,
|
|
|
|
clientPacks: clientPacks,
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-09-07 14:34:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if !atLeastOneHealthy {
|
|
|
|
return nil, fmt.Errorf("at least one node must be healthy")
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-09-07 14:34:20 +00:00
|
|
|
|
[#48] pool: add `Close` method
Fix occasional panic in tests:
```
> for i in (seq 1 100); go test -race -count=1 ./pool/... ; end
...
{"level":"warn","ts":1635251466.567485,"caller":"pool/pool.go:122","msg":"failed to create neofs session token for client","address":"peer0","error":"error session"}
panic: Fail in goroutine after TestTwoNodes has completed
goroutine 6 [running]:
testing.(*common).Fail(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:710 +0x1b4
testing.(*common).FailNow(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:732 +0x2f
testing.(*common).Fatalf(0xc000074070, {0xd9d816, 0x2e}, {0xc000094050, 0x5, 0x5})
/usr/lib/go/src/testing/testing.go:830 +0x85
github.com/golang/mock/gomock.(*Controller).Call.func1(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:231 +0x44d
github.com/golang/mock/gomock.(*Controller).Call(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:247 +0xce
github.com/nspcc-dev/neofs-sdk-go/pool.(*MockClient).EndpointInfo(0xc0002dac30, {0xe85528, 0xc00008a120}, {0x0, 0x0, 0x0})
/home/dzeta/repo/neofs-sdk-go/pool/mock_test.go:186 +0x298
github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth.func1(0x1, {0xe950d8, 0xc0002dac30})
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:183 +0x188
created by github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:174 +0x233
```
Signed-off-by: Evgenii Stratonikov <evgeniy@nspcc.ru>
2021-10-26 12:36:08 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2021-10-25 12:57:55 +00:00
|
|
|
pool := &pool{
|
2022-02-02 11:21:23 +00:00
|
|
|
innerPools: inner,
|
|
|
|
key: options.Key,
|
|
|
|
owner: ownerID,
|
|
|
|
cancel: cancel,
|
|
|
|
closedCh: make(chan struct{}),
|
|
|
|
cache: cache,
|
|
|
|
stokenDuration: options.SessionExpirationDuration,
|
|
|
|
stokenThreshold: options.SessionTokenThreshold,
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
2021-06-21 11:12:08 +00:00
|
|
|
go startRebalance(ctx, pool, options)
|
|
|
|
return pool, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func startRebalance(ctx context.Context, p *pool, options *BuilderOptions) {
|
|
|
|
ticker := time.NewTimer(options.ClientRebalanceInterval)
|
2021-11-16 13:50:33 +00:00
|
|
|
buffers := make([][]float64, len(options.nodesParams))
|
|
|
|
for i, params := range options.nodesParams {
|
|
|
|
buffers[i] = make([]float64, len(params.weights))
|
|
|
|
}
|
2021-06-21 11:12:08 +00:00
|
|
|
|
2021-07-20 08:02:14 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
[#48] pool: add `Close` method
Fix occasional panic in tests:
```
> for i in (seq 1 100); go test -race -count=1 ./pool/... ; end
...
{"level":"warn","ts":1635251466.567485,"caller":"pool/pool.go:122","msg":"failed to create neofs session token for client","address":"peer0","error":"error session"}
panic: Fail in goroutine after TestTwoNodes has completed
goroutine 6 [running]:
testing.(*common).Fail(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:710 +0x1b4
testing.(*common).FailNow(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:732 +0x2f
testing.(*common).Fatalf(0xc000074070, {0xd9d816, 0x2e}, {0xc000094050, 0x5, 0x5})
/usr/lib/go/src/testing/testing.go:830 +0x85
github.com/golang/mock/gomock.(*Controller).Call.func1(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:231 +0x44d
github.com/golang/mock/gomock.(*Controller).Call(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:247 +0xce
github.com/nspcc-dev/neofs-sdk-go/pool.(*MockClient).EndpointInfo(0xc0002dac30, {0xe85528, 0xc00008a120}, {0x0, 0x0, 0x0})
/home/dzeta/repo/neofs-sdk-go/pool/mock_test.go:186 +0x298
github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth.func1(0x1, {0xe950d8, 0xc0002dac30})
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:183 +0x188
created by github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:174 +0x233
```
Signed-off-by: Evgenii Stratonikov <evgeniy@nspcc.ru>
2021-10-26 12:36:08 +00:00
|
|
|
close(p.closedCh)
|
2021-07-20 08:02:14 +00:00
|
|
|
return
|
|
|
|
case <-ticker.C:
|
2021-11-16 13:50:33 +00:00
|
|
|
updateNodesHealth(ctx, p, options, buffers)
|
2021-07-20 08:02:14 +00:00
|
|
|
ticker.Reset(options.ClientRebalanceInterval)
|
|
|
|
}
|
2021-06-21 11:12:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
func updateNodesHealth(ctx context.Context, p *pool, options *BuilderOptions, buffers [][]float64) {
|
|
|
|
wg := sync.WaitGroup{}
|
|
|
|
for i, inner := range p.innerPools {
|
|
|
|
wg.Add(1)
|
|
|
|
|
|
|
|
bufferWeights := buffers[i]
|
|
|
|
go func(i int, innerPool *innerPool) {
|
|
|
|
defer wg.Done()
|
|
|
|
updateInnerNodesHealth(ctx, p, i, options, bufferWeights)
|
|
|
|
}(i, inner)
|
|
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
}
|
|
|
|
|
|
|
|
func updateInnerNodesHealth(ctx context.Context, pool *pool, i int, options *BuilderOptions, bufferWeights []float64) {
|
|
|
|
if i > len(pool.innerPools)-1 {
|
|
|
|
return
|
2021-06-21 11:12:08 +00:00
|
|
|
}
|
2021-11-16 13:50:33 +00:00
|
|
|
p := pool.innerPools[i]
|
|
|
|
|
2021-06-21 11:12:08 +00:00
|
|
|
healthyChanged := false
|
|
|
|
wg := sync.WaitGroup{}
|
2021-12-02 12:21:54 +00:00
|
|
|
|
2022-02-02 13:25:36 +00:00
|
|
|
var prmEndpoint client.EndpointInfoPrm
|
2021-12-02 12:21:54 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
for j, cPack := range p.clientPacks {
|
2021-06-21 11:12:08 +00:00
|
|
|
wg.Add(1)
|
2021-12-02 12:21:54 +00:00
|
|
|
go func(j int, cli Client) {
|
2021-06-21 11:12:08 +00:00
|
|
|
defer wg.Done()
|
2021-05-25 08:48:01 +00:00
|
|
|
ok := true
|
2021-06-21 11:12:08 +00:00
|
|
|
tctx, c := context.WithTimeout(ctx, options.NodeRequestTimeout)
|
|
|
|
defer c()
|
2021-12-02 12:21:54 +00:00
|
|
|
|
|
|
|
if _, err := cli.EndpointInfo(tctx, prmEndpoint); err != nil {
|
2021-06-21 11:12:08 +00:00
|
|
|
ok = false
|
2021-11-16 13:50:33 +00:00
|
|
|
bufferWeights[j] = 0
|
2021-06-21 11:12:08 +00:00
|
|
|
}
|
2021-10-25 12:57:55 +00:00
|
|
|
p.lock.RLock()
|
2021-11-16 13:50:33 +00:00
|
|
|
cp := *p.clientPacks[j]
|
2021-10-25 12:57:55 +00:00
|
|
|
p.lock.RUnlock()
|
|
|
|
|
2021-06-21 11:12:08 +00:00
|
|
|
if ok {
|
2021-11-16 13:50:33 +00:00
|
|
|
bufferWeights[j] = options.nodesParams[i].weights[j]
|
2021-10-25 12:57:55 +00:00
|
|
|
if !cp.healthy {
|
2022-02-02 13:25:36 +00:00
|
|
|
cliRes, err := createSessionTokenForDuration(ctx, cli, options.SessionExpirationDuration)
|
|
|
|
if err != nil {
|
2021-07-28 08:42:55 +00:00
|
|
|
ok = false
|
2021-11-16 13:50:33 +00:00
|
|
|
bufferWeights[j] = 0
|
2021-10-25 12:57:55 +00:00
|
|
|
} else {
|
2021-11-16 13:50:33 +00:00
|
|
|
tkn := pool.newSessionToken(cliRes)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
_ = pool.cache.Put(formCacheKey(cp.address, pool.key), tkn)
|
2021-07-28 08:42:55 +00:00
|
|
|
}
|
|
|
|
}
|
2021-10-25 12:57:55 +00:00
|
|
|
} else {
|
2021-11-16 13:50:33 +00:00
|
|
|
pool.cache.DeleteByPrefix(cp.address)
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-06-21 11:12:08 +00:00
|
|
|
|
|
|
|
p.lock.Lock()
|
2021-11-16 13:50:33 +00:00
|
|
|
if p.clientPacks[j].healthy != ok {
|
|
|
|
p.clientPacks[j].healthy = ok
|
2021-06-21 11:12:08 +00:00
|
|
|
healthyChanged = true
|
|
|
|
}
|
|
|
|
p.lock.Unlock()
|
2021-11-16 13:50:33 +00:00
|
|
|
}(j, cPack.client)
|
2021-06-21 11:12:08 +00:00
|
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
if healthyChanged {
|
|
|
|
probabilities := adjustWeights(bufferWeights)
|
|
|
|
source := rand.NewSource(time.Now().UnixNano())
|
|
|
|
p.lock.Lock()
|
|
|
|
p.sampler = NewSampler(probabilities, source)
|
|
|
|
p.lock.Unlock()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func adjustWeights(weights []float64) []float64 {
|
|
|
|
adjusted := make([]float64, len(weights))
|
|
|
|
sum := 0.0
|
|
|
|
for _, weight := range weights {
|
|
|
|
sum += weight
|
|
|
|
}
|
|
|
|
if sum > 0 {
|
|
|
|
for i, weight := range weights {
|
|
|
|
adjusted[i] = weight / sum
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-06-21 11:12:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return adjusted
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
|
2021-12-29 14:40:37 +00:00
|
|
|
func (p *pool) Connection() (Client, *session.Token, error) {
|
2021-10-25 12:57:55 +00:00
|
|
|
cp, err := p.connection()
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
tok := p.cache.Get(formCacheKey(cp.address, p.key))
|
|
|
|
return cp.client, tok, nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (p *pool) connection() (*clientPack, error) {
|
2021-11-16 13:50:33 +00:00
|
|
|
for _, inner := range p.innerPools {
|
|
|
|
cp, err := inner.connection()
|
|
|
|
if err == nil {
|
|
|
|
return cp, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, errors.New("no healthy client")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *innerPool) connection() (*clientPack, error) {
|
2021-05-25 08:48:01 +00:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
if len(p.clientPacks) == 1 {
|
|
|
|
cp := p.clientPacks[0]
|
|
|
|
if cp.healthy {
|
2021-10-25 12:57:55 +00:00
|
|
|
return cp, nil
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-10-25 12:57:55 +00:00
|
|
|
return nil, errors.New("no healthy client")
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
attempts := 3 * len(p.clientPacks)
|
|
|
|
for k := 0; k < attempts; k++ {
|
|
|
|
i := p.sampler.Next()
|
|
|
|
if cp := p.clientPacks[i]; cp.healthy {
|
2021-10-25 12:57:55 +00:00
|
|
|
return cp, nil
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
|
|
|
}
|
2021-11-16 13:50:33 +00:00
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
return nil, errors.New("no healthy client")
|
2021-05-25 08:48:01 +00:00
|
|
|
}
|
2021-05-28 20:12:58 +00:00
|
|
|
|
|
|
|
func (p *pool) OwnerID() *owner.ID {
|
|
|
|
return p.owner
|
|
|
|
}
|
2021-06-13 12:18:43 +00:00
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
func formCacheKey(address string, key *ecdsa.PrivateKey) string {
|
2021-12-10 13:56:04 +00:00
|
|
|
k := keys.PrivateKey{PrivateKey: *key}
|
|
|
|
return address + k.String()
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) conn(ctx context.Context, cfg *callConfig) (*clientPack, []client.CallOption, error) {
|
2021-10-25 12:57:55 +00:00
|
|
|
cp, err := p.connection()
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
clientCallOptions := make([]client.CallOption, 0, 3)
|
2021-10-25 12:57:55 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
key := p.key
|
|
|
|
if cfg.key != nil {
|
|
|
|
key = cfg.key
|
|
|
|
}
|
|
|
|
clientCallOptions = append(clientCallOptions, client.WithKey(key))
|
|
|
|
|
|
|
|
sessionToken := cfg.stoken
|
2021-12-16 15:46:38 +00:00
|
|
|
if sessionToken == nil && cfg.useDefaultSession {
|
2021-11-15 06:35:30 +00:00
|
|
|
cacheKey := formCacheKey(cp.address, key)
|
|
|
|
sessionToken = p.cache.Get(cacheKey)
|
|
|
|
if sessionToken == nil {
|
2022-02-02 13:25:36 +00:00
|
|
|
cliRes, err := createSessionTokenForDuration(ctx, cp.client, p.stokenDuration)
|
2021-11-15 06:35:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-01-13 13:16:35 +00:00
|
|
|
ownerID := owner.NewIDFromPublicKey(&key.PublicKey)
|
2022-01-17 10:35:39 +00:00
|
|
|
sessionToken = sessionTokenForOwner(ownerID, cliRes)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
cfg.stoken = sessionToken
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
_ = p.cache.Put(cacheKey, sessionToken)
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
2021-06-22 09:15:21 +00:00
|
|
|
}
|
2021-11-15 06:35:30 +00:00
|
|
|
clientCallOptions = append(clientCallOptions, client.WithSession(sessionToken))
|
2021-06-22 09:15:21 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if cfg.btoken != nil {
|
|
|
|
clientCallOptions = append(clientCallOptions, client.WithBearer(cfg.btoken))
|
2021-06-22 09:15:21 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
return cp, clientCallOptions, nil
|
2021-06-22 09:15:21 +00:00
|
|
|
}
|
|
|
|
|
2021-11-03 14:34:02 +00:00
|
|
|
func (p *pool) checkSessionTokenErr(err error, address string) bool {
|
2021-10-25 12:57:55 +00:00
|
|
|
if err == nil {
|
2021-11-03 14:34:02 +00:00
|
|
|
return false
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2022-02-02 13:27:20 +00:00
|
|
|
if strings.Contains(err.Error(), "session token does not exist") ||
|
|
|
|
strings.Contains(err.Error(), "session token has been expired") {
|
2021-10-25 12:57:55 +00:00
|
|
|
p.cache.DeleteByPrefix(address)
|
2021-11-03 14:34:02 +00:00
|
|
|
return true
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
2021-11-03 14:34:02 +00:00
|
|
|
|
|
|
|
return false
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2022-02-02 13:25:36 +00:00
|
|
|
func createSessionTokenForDuration(ctx context.Context, c Client, dur uint64) (*client.CreateSessionRes, error) {
|
|
|
|
ni, err := c.NetworkInfo(ctx, client.NetworkInfoPrm{})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
epoch := ni.Info().CurrentEpoch()
|
|
|
|
|
|
|
|
var prm client.CreateSessionPrm
|
|
|
|
if math.MaxUint64-epoch < dur {
|
|
|
|
prm.SetExp(math.MaxUint64)
|
|
|
|
} else {
|
|
|
|
prm.SetExp(epoch + dur)
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.CreateSession(ctx, prm)
|
|
|
|
}
|
|
|
|
|
2022-02-02 11:21:23 +00:00
|
|
|
func (p *pool) removeSessionTokenAfterThreshold(cfg *callConfig) error {
|
|
|
|
cp, err := p.connection()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
key := p.key
|
|
|
|
if cfg.key != nil {
|
|
|
|
key = cfg.key
|
|
|
|
}
|
|
|
|
|
|
|
|
ts, ok := p.cache.GetAccessTime(formCacheKey(cp.address, key))
|
|
|
|
if ok && time.Since(ts) > p.stokenThreshold {
|
|
|
|
p.cache.DeleteByPrefix(cp.address)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
type callContext struct {
|
2022-02-11 14:40:09 +00:00
|
|
|
// base context for RPC
|
|
|
|
context.Context
|
2022-02-07 20:27:56 +00:00
|
|
|
|
|
|
|
client Client
|
|
|
|
|
|
|
|
// client endpoint
|
|
|
|
endpoint string
|
|
|
|
|
|
|
|
// request signer
|
|
|
|
key *ecdsa.PrivateKey
|
|
|
|
|
|
|
|
// flag to open default session if session token is missing
|
|
|
|
sessionDefault bool
|
2022-02-11 14:40:09 +00:00
|
|
|
sessionTarget func(session.Token)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
func (p *pool) initCallContext(ctx *callContext, cfg *callConfig) error {
|
2022-02-07 20:27:56 +00:00
|
|
|
cp, err := p.connection()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.key = cfg.key
|
|
|
|
if ctx.key == nil {
|
2022-02-11 14:40:09 +00:00
|
|
|
// use pool key if caller didn't specify its own
|
2022-02-07 20:27:56 +00:00
|
|
|
ctx.key = p.key
|
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
ctx.endpoint = cp.address
|
|
|
|
ctx.client = cp.client
|
|
|
|
|
|
|
|
if ctx.sessionTarget == nil && cfg.stoken != nil {
|
|
|
|
ctx.sessionTarget(*cfg.stoken)
|
|
|
|
}
|
|
|
|
|
|
|
|
// note that we don't override session provided by the caller
|
|
|
|
ctx.sessionDefault = cfg.stoken == nil && cfg.useDefaultSession
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
return err
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
type callContextWithRetry struct {
|
|
|
|
callContext
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
noRetry bool
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
func (p *pool) initCallContextWithRetry(ctx *callContextWithRetry, cfg *callConfig) error {
|
|
|
|
err := p.initCallContext(&ctx.callContext, cfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
// don't retry if session was specified by the caller
|
|
|
|
ctx.noRetry = cfg.stoken != nil
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *pool) openDefaultSession(ctx *callContext) error {
|
|
|
|
cacheKey := formCacheKey(ctx.endpoint, ctx.key)
|
|
|
|
|
|
|
|
tok := p.cache.Get(cacheKey)
|
|
|
|
if tok != nil {
|
|
|
|
// use cached token
|
|
|
|
ctx.sessionTarget(*tok)
|
|
|
|
return nil
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
// open new session
|
|
|
|
var cliPrm client.CreateSessionPrm
|
|
|
|
|
|
|
|
cliPrm.SetExp(math.MaxUint32)
|
|
|
|
|
|
|
|
cliRes, err := ctx.client.CreateSession(ctx, cliPrm)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("session API client: %w", err)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
tok = sessionTokenForOwner(owner.NewIDFromPublicKey(&ctx.key.PublicKey), cliRes)
|
|
|
|
|
|
|
|
// sign the token
|
|
|
|
err = tok.Sign(ctx.key)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("sign token of the opened session: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// cache the opened session
|
|
|
|
p.cache.Put(cacheKey, tok)
|
|
|
|
|
|
|
|
ctx.sessionTarget(*tok)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *pool) handleAttemptError(ctx *callContextWithRetry, err error) bool {
|
|
|
|
isTokenErr := p.checkSessionTokenErr(err, ctx.endpoint)
|
|
|
|
// note that checkSessionTokenErr must be called
|
|
|
|
res := isTokenErr && !ctx.noRetry
|
|
|
|
|
|
|
|
ctx.noRetry = true
|
|
|
|
|
|
|
|
return res
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (p *pool) PutObject(ctx context.Context, hdr object.Object, payload io.Reader, opts ...CallOption) (*oid.ID, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2022-02-02 11:21:23 +00:00
|
|
|
|
|
|
|
// Put object is different from other object service methods. Put request
|
|
|
|
// can't be resent in case of session token failures (i.e. session token is
|
|
|
|
// invalid due to lifetime expiration or server restart). The reason is that
|
|
|
|
// object's payload can be provided as a stream that should be read only once.
|
|
|
|
//
|
|
|
|
// To solve this issue, pool regenerates session tokens upon each request.
|
|
|
|
// In case of subsequent requests, pool avoids session token initialization
|
|
|
|
// by checking when the session token was accessed for the last time. If it
|
|
|
|
// hits a threshold, session token is removed from cache for a new one to be
|
|
|
|
// issued.
|
|
|
|
err := p.removeSessionTokenAfterThreshold(cfg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
var ctxCall callContext
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
ctxCall.Context = ctx
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
err = p.initCallContext(&ctxCall, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
2022-02-11 14:40:09 +00:00
|
|
|
return nil, fmt.Errorf("init call context")
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
var prm client.PrmObjectPutInit
|
|
|
|
|
|
|
|
wObj, err := ctxCall.client.ObjectPutInit(ctx, prm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("init writing on API client: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
if ctxCall.sessionDefault {
|
|
|
|
ctxCall.sessionTarget = wObj.WithinSession
|
|
|
|
err = p.openDefaultSession(&ctxCall)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("open default session: %w", err)
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
wObj.UseKey(*ctxCall.key)
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
if cfg.btoken != nil {
|
|
|
|
wObj.WithBearerToken(*cfg.btoken)
|
|
|
|
}
|
|
|
|
|
|
|
|
if wObj.WriteHeader(hdr) {
|
|
|
|
sz := hdr.PayloadSize()
|
|
|
|
|
|
|
|
if data := hdr.Payload(); len(data) > 0 {
|
|
|
|
if payload != nil {
|
|
|
|
payload = io.MultiReader(bytes.NewReader(data), payload)
|
|
|
|
} else {
|
|
|
|
payload = bytes.NewReader(data)
|
|
|
|
sz = uint64(len(data))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if payload != nil {
|
|
|
|
const defaultBufferSizePut = 4096 // configure?
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
if sz == 0 || sz > defaultBufferSizePut {
|
|
|
|
sz = defaultBufferSizePut
|
|
|
|
}
|
|
|
|
|
|
|
|
buf := make([]byte, sz)
|
|
|
|
|
|
|
|
var n int
|
|
|
|
|
|
|
|
for {
|
|
|
|
n, err = payload.Read(buf)
|
|
|
|
if n > 0 {
|
2022-02-11 05:03:14 +00:00
|
|
|
if !wObj.WritePayloadChunk(buf[:n]) {
|
2022-02-07 20:27:56 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if errors.Is(err, io.EOF) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, fmt.Errorf("read payload: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
res, err := wObj.Close()
|
2021-11-17 11:22:32 +00:00
|
|
|
if err != nil { // here err already carries both status and client errors
|
2022-02-07 20:27:56 +00:00
|
|
|
// removes session token from cache in case of token error
|
|
|
|
p.checkSessionTokenErr(err, ctxCall.endpoint)
|
|
|
|
return nil, fmt.Errorf("client failure: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var id oid.ID
|
|
|
|
|
|
|
|
if !res.ReadStoredObject(&id) {
|
|
|
|
return nil, errors.New("missing ID of the stored object")
|
2021-11-17 11:22:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
return &id, nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) DeleteObject(ctx context.Context, params *client.DeleteObjectParams, opts ...CallOption) error {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-01-11 17:17:31 +00:00
|
|
|
_, err = cp.client.DeleteObject(ctx, params, options...)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.DeleteObject(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// here err already carries both status and client errors
|
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
type objectReadCloser client.ObjectReader
|
|
|
|
|
|
|
|
func (x *objectReadCloser) Read(p []byte) (int, error) {
|
|
|
|
return (*client.ObjectReader)(x).Read(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *objectReadCloser) Close() error {
|
|
|
|
_, err := (*client.ObjectReader)(x).Close()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
type ResGetObject struct {
|
|
|
|
Header object.Object
|
|
|
|
|
|
|
|
Payload io.ReadCloser
|
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
func (p *pool) callWithRetry(ctx *callContextWithRetry, f func() error) error {
|
|
|
|
var err error
|
|
|
|
|
|
|
|
if ctx.sessionDefault {
|
|
|
|
err = p.openDefaultSession(&ctx.callContext)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("open default session: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = f()
|
|
|
|
|
|
|
|
if p.checkSessionTokenErr(err, ctx.endpoint) && !ctx.noRetry {
|
|
|
|
// don't retry anymore
|
|
|
|
ctx.noRetry = true
|
|
|
|
return p.callWithRetry(ctx, f)
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
func (p *pool) GetObject(ctx context.Context, addr address.Address, opts ...CallOption) (*ResGetObject, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
var prm client.PrmObjectGet
|
|
|
|
|
|
|
|
var cc callContextWithRetry
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
cc.Context = ctx
|
|
|
|
cc.sessionTarget = prm.WithinSession
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
err := p.initCallContextWithRetry(&cc, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
if cnr := addr.ContainerID(); cnr != nil {
|
|
|
|
prm.FromContainer(*cnr)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
if obj := addr.ObjectID(); obj != nil {
|
|
|
|
prm.ByID(*obj)
|
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
var res ResGetObject
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
err = p.callWithRetry(&cc, func() error {
|
|
|
|
rObj, err := cc.client.ObjectGetInit(ctx, prm)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("init object reading on client: %w", err)
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
rObj.UseKey(*cc.key)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
if !rObj.ReadHeader(&res.Header) {
|
|
|
|
_, err = rObj.Close()
|
|
|
|
return fmt.Errorf("read header: %w", err)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
res.Payload = (*objectReadCloser)(rObj)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-11 14:40:09 +00:00
|
|
|
return nil
|
|
|
|
})
|
2022-02-07 20:27:56 +00:00
|
|
|
|
|
|
|
return &res, nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) GetObjectHeader(ctx context.Context, params *client.ObjectHeaderParams, opts ...CallOption) (*object.Object, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-11-17 11:22:32 +00:00
|
|
|
res, err := cp.client.HeadObject(ctx, params, options...)
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.GetObjectHeader(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Object(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) ObjectPayloadRangeData(ctx context.Context, params *client.RangeDataParams, opts ...CallOption) ([]byte, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
res, err := cp.client.ObjectPayloadRangeData(ctx, params, options...)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.ObjectPayloadRangeData(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Data(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func copyRangeChecksumParams(prm *client.RangeChecksumParams) *client.RangeChecksumParams {
|
|
|
|
var prmCopy client.RangeChecksumParams
|
|
|
|
|
|
|
|
prmCopy.WithAddress(prm.Address())
|
|
|
|
prmCopy.WithSalt(prm.Salt())
|
|
|
|
prmCopy.WithRangeList(prm.RangeList()...)
|
|
|
|
|
|
|
|
return &prmCopy
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) ObjectPayloadRangeSHA256(ctx context.Context, params *client.RangeChecksumParams, opts ...CallOption) ([][32]byte, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// FIXME: pretty bad approach but we should not mutate params through the pointer
|
|
|
|
// If non-SHA256 algo is set then we need to reset it.
|
|
|
|
params = copyRangeChecksumParams(params)
|
|
|
|
// SHA256 by default, no need to do smth
|
|
|
|
|
|
|
|
res, err := cp.client.HashObjectPayloadRanges(ctx, params, options...)
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.ObjectPayloadRangeSHA256(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
cliHashes := res.Hashes()
|
|
|
|
|
|
|
|
hs := make([][sha256.Size]byte, len(cliHashes))
|
|
|
|
|
|
|
|
for i := range cliHashes {
|
|
|
|
if ln := len(cliHashes[i]); ln != sha256.Size {
|
|
|
|
return nil, fmt.Errorf("invalid SHA256 checksum size %d", ln)
|
|
|
|
}
|
|
|
|
|
|
|
|
copy(hs[i][:], cliHashes[i])
|
|
|
|
}
|
|
|
|
|
|
|
|
return hs, nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) ObjectPayloadRangeTZ(ctx context.Context, params *client.RangeChecksumParams, opts ...CallOption) ([][64]byte, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// FIXME: pretty bad approach but we should not mutate params through the pointer
|
|
|
|
// We need to set Tillich-Zemor algo.
|
|
|
|
params = copyRangeChecksumParams(params)
|
|
|
|
params.TZ()
|
|
|
|
|
|
|
|
res, err := cp.client.HashObjectPayloadRanges(ctx, params, options...)
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.ObjectPayloadRangeTZ(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
cliHashes := res.Hashes()
|
|
|
|
|
|
|
|
hs := make([][client.TZSize]byte, len(cliHashes))
|
|
|
|
|
|
|
|
for i := range cliHashes {
|
|
|
|
if ln := len(cliHashes[i]); ln != client.TZSize {
|
|
|
|
return nil, fmt.Errorf("invalid TZ checksum size %d", ln)
|
|
|
|
}
|
|
|
|
|
|
|
|
copy(hs[i][:], cliHashes[i])
|
|
|
|
}
|
|
|
|
|
|
|
|
return hs, nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2022-01-25 16:20:32 +00:00
|
|
|
func (p *pool) SearchObject(ctx context.Context, params *client.SearchObjectParams, opts ...CallOption) ([]*oid.ID, error) {
|
2021-12-16 15:46:38 +00:00
|
|
|
cfg := cfgFromOpts(append(opts, useDefaultSession())...)
|
2021-11-15 06:35:30 +00:00
|
|
|
cp, options, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-11-17 11:22:32 +00:00
|
|
|
res, err := cp.client.SearchObjects(ctx, params, options...)
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.SearchObject(ctx, params, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.IDList(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) PutContainer(ctx context.Context, cnr *container.Container, opts ...CallOption) (*cid.ID, error) {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.ContainerPutPrm
|
|
|
|
|
|
|
|
if cnr != nil {
|
|
|
|
cliPrm.SetContainer(*cnr)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cp.client.PutContainer(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.PutContainer(ctx, cnr, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.ID(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) GetContainer(ctx context.Context, cid *cid.ID, opts ...CallOption) (*container.Container, error) {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.ContainerGetPrm
|
|
|
|
|
|
|
|
if cid != nil {
|
|
|
|
cliPrm.SetContainer(*cid)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cp.client.GetContainer(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.GetContainer(ctx, cid, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Container(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) ListContainers(ctx context.Context, ownerID *owner.ID, opts ...CallOption) ([]*cid.ID, error) {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.ContainerListPrm
|
|
|
|
|
|
|
|
if ownerID != nil {
|
|
|
|
cliPrm.SetAccount(*ownerID)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cp.client.ListContainers(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.ListContainers(ctx, ownerID, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
return res.Containers(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) DeleteContainer(ctx context.Context, cid *cid.ID, opts ...CallOption) error {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.ContainerDeletePrm
|
|
|
|
|
|
|
|
if cid != nil {
|
|
|
|
cliPrm.SetContainer(*cid)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfg.stoken != nil {
|
|
|
|
cliPrm.SetSessionToken(*cfg.stoken)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = cp.client.DeleteContainer(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.DeleteContainer(ctx, cid, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// here err already carries both status and client errors
|
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-11-17 11:22:32 +00:00
|
|
|
func (p *pool) GetEACL(ctx context.Context, cid *cid.ID, opts ...CallOption) (*eacl.Table, error) {
|
2021-11-15 06:35:30 +00:00
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.EACLPrm
|
|
|
|
|
|
|
|
if cid != nil {
|
|
|
|
cliPrm.SetContainer(*cid)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cp.client.EACL(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
|
|
|
return p.GetEACL(ctx, cid, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
if err != nil { // here err already carries both status and client errors
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Table(), nil
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
func (p *pool) SetEACL(ctx context.Context, table *eacl.Table, opts ...CallOption) error {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-10-25 12:57:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.SetEACLPrm
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
if table != nil {
|
|
|
|
cliPrm.SetTable(*table)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
if cfg.stoken != nil {
|
|
|
|
cliPrm.SetSessionToken(*cfg.stoken)
|
2021-10-25 12:57:55 +00:00
|
|
|
}
|
2022-01-11 17:17:31 +00:00
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
_, err = cp.client.SetEACL(ctx, cliPrm)
|
2021-11-17 11:22:32 +00:00
|
|
|
|
2021-11-15 06:35:30 +00:00
|
|
|
if p.checkSessionTokenErr(err, cp.address) && !cfg.isRetry {
|
|
|
|
opts = append(opts, retry())
|
2021-12-02 12:21:54 +00:00
|
|
|
return p.SetEACL(ctx, table, opts...)
|
2021-11-03 14:34:02 +00:00
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// here err already carries both status and client errors
|
|
|
|
|
2021-10-25 12:57:55 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-12-17 10:36:07 +00:00
|
|
|
func (p *pool) Balance(ctx context.Context, o *owner.ID, opts ...CallOption) (*accounting.Decimal, error) {
|
|
|
|
cfg := cfgFromOpts(opts...)
|
2021-12-02 12:21:54 +00:00
|
|
|
cp, _, err := p.conn(ctx, cfg)
|
2021-12-17 10:36:07 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-12-02 12:21:54 +00:00
|
|
|
var cliPrm client.GetBalancePrm
|
|
|
|
|
|
|
|
if o != nil {
|
|
|
|
cliPrm.SetAccount(*o)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cp.client.GetBalance(ctx, cliPrm)
|
2022-01-11 17:17:31 +00:00
|
|
|
if err != nil { // here err already carries both status and client errors
|
2021-12-17 10:36:07 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Amount(), nil
|
|
|
|
}
|
|
|
|
|
2021-06-22 09:15:21 +00:00
|
|
|
func (p *pool) WaitForContainerPresence(ctx context.Context, cid *cid.ID, pollParams *ContainerPollingParams) error {
|
|
|
|
conn, _, err := p.Connection()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
wctx, cancel := context.WithTimeout(ctx, pollParams.CreationTimeout)
|
|
|
|
defer cancel()
|
|
|
|
ticker := time.NewTimer(pollParams.PollInterval)
|
|
|
|
defer ticker.Stop()
|
|
|
|
wdone := wctx.Done()
|
|
|
|
done := ctx.Done()
|
2021-12-02 12:21:54 +00:00
|
|
|
|
|
|
|
var cliPrm client.ContainerGetPrm
|
|
|
|
|
|
|
|
if cid != nil {
|
|
|
|
cliPrm.SetContainer(*cid)
|
|
|
|
}
|
|
|
|
|
2021-06-22 09:15:21 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
return ctx.Err()
|
|
|
|
case <-wdone:
|
|
|
|
return wctx.Err()
|
|
|
|
case <-ticker.C:
|
2021-12-02 12:21:54 +00:00
|
|
|
_, err = conn.GetContainer(ctx, cliPrm)
|
2021-06-22 09:15:21 +00:00
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
ticker.Reset(pollParams.PollInterval)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
[#48] pool: add `Close` method
Fix occasional panic in tests:
```
> for i in (seq 1 100); go test -race -count=1 ./pool/... ; end
...
{"level":"warn","ts":1635251466.567485,"caller":"pool/pool.go:122","msg":"failed to create neofs session token for client","address":"peer0","error":"error session"}
panic: Fail in goroutine after TestTwoNodes has completed
goroutine 6 [running]:
testing.(*common).Fail(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:710 +0x1b4
testing.(*common).FailNow(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:732 +0x2f
testing.(*common).Fatalf(0xc000074070, {0xd9d816, 0x2e}, {0xc000094050, 0x5, 0x5})
/usr/lib/go/src/testing/testing.go:830 +0x85
github.com/golang/mock/gomock.(*Controller).Call.func1(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:231 +0x44d
github.com/golang/mock/gomock.(*Controller).Call(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:247 +0xce
github.com/nspcc-dev/neofs-sdk-go/pool.(*MockClient).EndpointInfo(0xc0002dac30, {0xe85528, 0xc00008a120}, {0x0, 0x0, 0x0})
/home/dzeta/repo/neofs-sdk-go/pool/mock_test.go:186 +0x298
github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth.func1(0x1, {0xe950d8, 0xc0002dac30})
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:183 +0x188
created by github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:174 +0x233
```
Signed-off-by: Evgenii Stratonikov <evgeniy@nspcc.ru>
2021-10-26 12:36:08 +00:00
|
|
|
|
2021-11-16 13:50:33 +00:00
|
|
|
// Close closes the pool and releases all the associated resources.
|
[#48] pool: add `Close` method
Fix occasional panic in tests:
```
> for i in (seq 1 100); go test -race -count=1 ./pool/... ; end
...
{"level":"warn","ts":1635251466.567485,"caller":"pool/pool.go:122","msg":"failed to create neofs session token for client","address":"peer0","error":"error session"}
panic: Fail in goroutine after TestTwoNodes has completed
goroutine 6 [running]:
testing.(*common).Fail(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:710 +0x1b4
testing.(*common).FailNow(0xc0002e1380)
/usr/lib/go/src/testing/testing.go:732 +0x2f
testing.(*common).Fatalf(0xc000074070, {0xd9d816, 0x2e}, {0xc000094050, 0x5, 0x5})
/usr/lib/go/src/testing/testing.go:830 +0x85
github.com/golang/mock/gomock.(*Controller).Call.func1(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:231 +0x44d
github.com/golang/mock/gomock.(*Controller).Call(0xc0002f4120, {0xd68380, 0xc0002dac30}, {0xd8847f, 0xc}, {0xc000074020, 0x1, 0x1})
/home/dzeta/go/pkg/mod/github.com/golang/mock@v1.6.0/gomock/controller.go:247 +0xce
github.com/nspcc-dev/neofs-sdk-go/pool.(*MockClient).EndpointInfo(0xc0002dac30, {0xe85528, 0xc00008a120}, {0x0, 0x0, 0x0})
/home/dzeta/repo/neofs-sdk-go/pool/mock_test.go:186 +0x298
github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth.func1(0x1, {0xe950d8, 0xc0002dac30})
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:183 +0x188
created by github.com/nspcc-dev/neofs-sdk-go/pool.updateNodesHealth
/home/dzeta/repo/neofs-sdk-go/pool/pool.go:174 +0x233
```
Signed-off-by: Evgenii Stratonikov <evgeniy@nspcc.ru>
2021-10-26 12:36:08 +00:00
|
|
|
func (p *pool) Close() {
|
|
|
|
p.cancel()
|
|
|
|
<-p.closedCh
|
|
|
|
}
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
// creates new session token from CreateSession call result.
|
|
|
|
func (p *pool) newSessionToken(cliRes *client.CreateSessionRes) *session.Token {
|
|
|
|
return sessionTokenForOwner(p.owner, cliRes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// creates new session token with specified owner from CreateSession call result.
|
|
|
|
func sessionTokenForOwner(id *owner.ID, cliRes *client.CreateSessionRes) *session.Token {
|
|
|
|
st := session.NewToken()
|
|
|
|
st.SetOwnerID(id)
|
|
|
|
st.SetID(cliRes.ID())
|
2021-12-02 12:21:54 +00:00
|
|
|
st.SetSessionKey(cliRes.PublicKey())
|
2021-11-17 11:22:32 +00:00
|
|
|
|
|
|
|
return st
|
|
|
|
}
|