From 560f73ab7ea83086f964505957967e1472ccfd1d Mon Sep 17 00:00:00 2001 From: Pavel Karpy Date: Thu, 13 Apr 2023 20:06:34 +0300 Subject: [PATCH] [#247] node, ir: Drop reputation related code Signed-off-by: Pavel Karpy --- cmd/frostfs-ir/defaults.go | 1 - cmd/frostfs-node/config.go | 27 -- cmd/frostfs-node/container.go | 2 +- cmd/frostfs-node/main.go | 1 - cmd/frostfs-node/morph.go | 3 - cmd/frostfs-node/object.go | 192 +-------- cmd/frostfs-node/reputation.go | 386 ------------------ cmd/frostfs-node/reputation/common/remote.go | 101 ----- cmd/frostfs-node/reputation/common/util.go | 53 --- .../reputation/intermediate/calculator.go | 57 --- .../reputation/intermediate/consumers.go | 66 --- .../reputation/intermediate/contract.go | 147 ------- .../reputation/intermediate/daughters.go | 51 --- .../reputation/intermediate/remote.go | 125 ------ .../reputation/intermediate/storage.go | 64 --- .../reputation/internal/client/client.go | 101 ----- .../reputation/internal/client/doc.go | 11 - cmd/frostfs-node/reputation/local/remote.go | 113 ----- cmd/frostfs-node/reputation/local/storage.go | 108 ----- cmd/frostfs-node/reputation/ticker/fixed.go | 90 ---- .../reputation/ticker/fixed_test.go | 118 ------ cmd/frostfs-node/timers.go | 43 -- pkg/innerring/initialization.go | 37 -- .../processors/reputation/handlers.go | 29 -- .../processors/reputation/process_put.go | 99 ----- .../processors/reputation/processor.go | 156 ------- pkg/innerring/rpc.go | 2 +- pkg/network/cache/client.go | 2 +- .../transport/reputation/grpc/service.go | 50 --- pkg/services/object/head/remote.go | 2 +- pkg/services/reputation/common/deps.go | 78 ---- pkg/services/reputation/common/managers.go | 133 ------ .../reputation/common/router/calls.go | 139 ------- pkg/services/reputation/common/router/deps.go | 28 -- pkg/services/reputation/common/router/opts.go | 28 -- .../reputation/common/router/router.go | 81 ---- pkg/services/reputation/common/router/util.go | 40 -- .../eigentrust/calculator/calculator.go | 90 ---- .../reputation/eigentrust/calculator/calls.go | 295 ------------- .../reputation/eigentrust/calculator/deps.go | 74 ---- .../reputation/eigentrust/calculator/opts.go | 30 -- .../reputation/eigentrust/controller/calls.go | 73 ---- .../eigentrust/controller/controller.go | 86 ---- .../reputation/eigentrust/controller/deps.go | 37 -- .../reputation/eigentrust/controller/opts.go | 30 -- .../reputation/eigentrust/iteration.go | 44 -- .../reputation/eigentrust/routes/builder.go | 59 --- .../reputation/eigentrust/routes/calls.go | 33 -- .../eigentrust/storage/consumers/calls.go | 201 --------- .../eigentrust/storage/consumers/storage.go | 40 -- .../eigentrust/storage/daughters/calls.go | 177 -------- .../eigentrust/storage/daughters/storage.go | 38 -- .../reputation/local/controller/calls.go | 193 --------- .../reputation/local/controller/controller.go | 84 ---- .../reputation/local/controller/deps.go | 34 -- .../reputation/local/controller/opts.go | 30 -- .../reputation/local/controller/util.go | 32 -- .../reputation/local/routes/builder.go | 59 --- pkg/services/reputation/local/routes/calls.go | 33 -- .../reputation/local/storage/calls.go | 175 -------- .../reputation/local/storage/storage.go | 41 -- pkg/services/reputation/rpc/response.go | 50 --- pkg/services/reputation/rpc/server.go | 13 - pkg/services/reputation/rpc/sign.go | 54 --- pkg/services/reputation/trust.go | 102 ----- 65 files changed, 15 insertions(+), 4956 deletions(-) delete mode 100644 cmd/frostfs-node/reputation.go delete mode 100644 cmd/frostfs-node/reputation/common/remote.go delete mode 100644 cmd/frostfs-node/reputation/common/util.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/calculator.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/consumers.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/contract.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/daughters.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/remote.go delete mode 100644 cmd/frostfs-node/reputation/intermediate/storage.go delete mode 100644 cmd/frostfs-node/reputation/internal/client/client.go delete mode 100644 cmd/frostfs-node/reputation/internal/client/doc.go delete mode 100644 cmd/frostfs-node/reputation/local/remote.go delete mode 100644 cmd/frostfs-node/reputation/local/storage.go delete mode 100644 cmd/frostfs-node/reputation/ticker/fixed.go delete mode 100644 cmd/frostfs-node/reputation/ticker/fixed_test.go delete mode 100644 cmd/frostfs-node/timers.go delete mode 100644 pkg/innerring/processors/reputation/handlers.go delete mode 100644 pkg/innerring/processors/reputation/process_put.go delete mode 100644 pkg/innerring/processors/reputation/processor.go delete mode 100644 pkg/network/transport/reputation/grpc/service.go delete mode 100644 pkg/services/reputation/common/deps.go delete mode 100644 pkg/services/reputation/common/managers.go delete mode 100644 pkg/services/reputation/common/router/calls.go delete mode 100644 pkg/services/reputation/common/router/deps.go delete mode 100644 pkg/services/reputation/common/router/opts.go delete mode 100644 pkg/services/reputation/common/router/router.go delete mode 100644 pkg/services/reputation/common/router/util.go delete mode 100644 pkg/services/reputation/eigentrust/calculator/calculator.go delete mode 100644 pkg/services/reputation/eigentrust/calculator/calls.go delete mode 100644 pkg/services/reputation/eigentrust/calculator/deps.go delete mode 100644 pkg/services/reputation/eigentrust/calculator/opts.go delete mode 100644 pkg/services/reputation/eigentrust/controller/calls.go delete mode 100644 pkg/services/reputation/eigentrust/controller/controller.go delete mode 100644 pkg/services/reputation/eigentrust/controller/deps.go delete mode 100644 pkg/services/reputation/eigentrust/controller/opts.go delete mode 100644 pkg/services/reputation/eigentrust/iteration.go delete mode 100644 pkg/services/reputation/eigentrust/routes/builder.go delete mode 100644 pkg/services/reputation/eigentrust/routes/calls.go delete mode 100644 pkg/services/reputation/eigentrust/storage/consumers/calls.go delete mode 100644 pkg/services/reputation/eigentrust/storage/consumers/storage.go delete mode 100644 pkg/services/reputation/eigentrust/storage/daughters/calls.go delete mode 100644 pkg/services/reputation/eigentrust/storage/daughters/storage.go delete mode 100644 pkg/services/reputation/local/controller/calls.go delete mode 100644 pkg/services/reputation/local/controller/controller.go delete mode 100644 pkg/services/reputation/local/controller/deps.go delete mode 100644 pkg/services/reputation/local/controller/opts.go delete mode 100644 pkg/services/reputation/local/controller/util.go delete mode 100644 pkg/services/reputation/local/routes/builder.go delete mode 100644 pkg/services/reputation/local/routes/calls.go delete mode 100644 pkg/services/reputation/local/storage/calls.go delete mode 100644 pkg/services/reputation/local/storage/storage.go delete mode 100644 pkg/services/reputation/rpc/response.go delete mode 100644 pkg/services/reputation/rpc/server.go delete mode 100644 pkg/services/reputation/rpc/sign.go delete mode 100644 pkg/services/reputation/trust.go diff --git a/cmd/frostfs-ir/defaults.go b/cmd/frostfs-ir/defaults.go index bd374fcb50..57959c1cff 100644 --- a/cmd/frostfs-ir/defaults.go +++ b/cmd/frostfs-ir/defaults.go @@ -142,7 +142,6 @@ func setWorkersDefaults(cfg *viper.Viper) { cfg.SetDefault("workers.frostfs", "10") cfg.SetDefault("workers.container", "10") cfg.SetDefault("workers.alphabet", "10") - cfg.SetDefault("workers.reputation", "10") cfg.SetDefault("workers.subnet", "10") } diff --git a/cmd/frostfs-node/config.go b/cmd/frostfs-node/config.go index d110665f5e..987d27fcdc 100644 --- a/cmd/frostfs-node/config.go +++ b/cmd/frostfs-node/config.go @@ -55,8 +55,6 @@ import ( "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object_manager/tombstone" tsourse "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object_manager/tombstone/source" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/replicator" - trustcontroller "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/controller" - truststorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/storage" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/tree" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/util/response" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util" @@ -414,7 +412,6 @@ type cfg struct { cfgNodeInfo cfgNodeInfo cfgNetmap cfgNetmap cfgControlService cfgControlService - cfgReputation cfgReputation cfgObject cfgObject cfgNotifications cfgNotifications } @@ -452,8 +449,6 @@ type cfgMorph struct { // TTL of Sidechain cached values. Non-positive value disables caching. cacheTTL time.Duration - eigenTrustTicker *eigenTrustTickers // timers for EigenTrust iterations - proxyScriptHash neogoutil.Uint160 } @@ -532,16 +527,6 @@ type cfgControlService struct { server *grpc.Server } -type cfgReputation struct { - workerPool util.WorkerPool // pool for EigenTrust algorithm's iterations - - localTrustStorage *truststorage.Storage - - localTrustCtrl *trustcontroller.Controller - - scriptHash neogoutil.Uint160 -} - var persistateSideChainLastBlockKey = []byte("side_chain_last_processed_block") func initCfg(appCfg *config.Config) *cfg { @@ -582,8 +567,6 @@ func initCfg(appCfg *config.Config) *cfg { } c.cfgObject = initCfgObject(appCfg) - c.cfgReputation = initReputation(appCfg) - user.IDFromKey(&c.ownerIDFromKey, key.PrivateKey.PublicKey) c.metricsCollector = metrics.NewNodeMetrics() @@ -662,16 +645,6 @@ func initContainer(appCfg *config.Config) cfgContainer { } } -func initReputation(appCfg *config.Config) cfgReputation { - reputationWorkerPool, err := ants.NewPool(notificationHandlerPoolSize) - fatalOnErr(err) - - return cfgReputation{ - scriptHash: contractsconfig.Reputation(appCfg), - workerPool: reputationWorkerPool, - } -} - func initCfgGRPC() cfgGRPC { maxChunkSize := uint64(maxMsgSize) * 3 / 4 // 25% to meta, 75% to payload maxAddrAmount := uint64(maxChunkSize) / addressSize // each address is about 72 bytes diff --git a/cmd/frostfs-node/container.go b/cmd/frostfs-node/container.go index d5d8601e3d..633d4b2612 100644 --- a/cmd/frostfs-node/container.go +++ b/cmd/frostfs-node/container.go @@ -330,7 +330,7 @@ type remoteLoadAnnounceProvider struct { netmapKeys netmapCore.AnnouncedKeys clientCache interface { - Get(client.NodeInfo) (client.Client, error) + Get(client.NodeInfo) (client.MultiAddressClient, error) } deadEndProvider loadcontroller.WriterProvider diff --git a/cmd/frostfs-node/main.go b/cmd/frostfs-node/main.go index 786843b0b9..a6ee524644 100644 --- a/cmd/frostfs-node/main.go +++ b/cmd/frostfs-node/main.go @@ -102,7 +102,6 @@ func initApp(ctx context.Context, c *cfg) { initAndLog(c, "accounting", func(c *cfg) { initAccountingService(ctx, c) }) initAndLog(c, "container", func(c *cfg) { initContainerService(ctx, c) }) initAndLog(c, "session", initSessionService) - initAndLog(c, "reputation", func(c *cfg) { initReputationService(ctx, c) }) initAndLog(c, "notification", func(c *cfg) { initNotifications(ctx, c) }) initAndLog(c, "object", initObjectService) initAndLog(c, "tree", initTreeService) diff --git a/cmd/frostfs-node/morph.go b/cmd/frostfs-node/morph.go index 72378d8f35..2e086f994a 100644 --- a/cmd/frostfs-node/morph.go +++ b/cmd/frostfs-node/morph.go @@ -235,8 +235,6 @@ func listenMorphNotifications(ctx context.Context, c *cfg) { zap.String("chain", "side"), zap.Uint32("block_index", block.Index)) } - - tickBlockTimers(c) }) } @@ -285,7 +283,6 @@ func lookupScriptHashesInNNS(c *cfg) { {&c.cfgNetmap.scriptHash, client.NNSNetmapContractName}, {&c.cfgAccounting.scriptHash, client.NNSBalanceContractName}, {&c.cfgContainer.scriptHash, client.NNSContainerContractName}, - {&c.cfgReputation.scriptHash, client.NNSReputationContractName}, {&c.cfgMorph.proxyScriptHash, client.NNSProxyContractName}, } ) diff --git a/cmd/frostfs-node/object.go b/cmd/frostfs-node/object.go index 08a202df98..83025a44ca 100644 --- a/cmd/frostfs-node/object.go +++ b/cmd/frostfs-node/object.go @@ -1,7 +1,6 @@ package main import ( - "bytes" "context" "errors" "fmt" @@ -12,7 +11,6 @@ import ( policerconfig "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/config/policer" replicatorconfig "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/config/replicator" "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - coreclient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client" containercore "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/container" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/netmap" objectCore "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/object" @@ -20,6 +18,7 @@ import ( morphClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client" cntClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/container" nmClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/netmap" + "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/network/cache" objectTransportGRPC "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/network/transport/object/grpc" objectService "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object/acl" @@ -37,15 +36,10 @@ import ( "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/object_manager/placement" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/policer" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/replicator" - truststorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/storage" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client" - apistatus "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client/status" cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id" eaclSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/eacl" objectSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object" oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/user" "go.uber.org/zap" ) @@ -153,39 +147,12 @@ func (f *innerRingFetcherWithoutNotary) InnerRingKeys() ([][]byte, error) { return result, nil } -type coreClientConstructor reputationClientConstructor - -func (x *coreClientConstructor) Get(info coreclient.NodeInfo) (coreclient.MultiAddressClient, error) { - c, err := (*reputationClientConstructor)(x).Get(info) - if err != nil { - return nil, err - } - - return c.(coreclient.MultiAddressClient), nil -} - func initObjectService(c *cfg) { keyStorage := util.NewKeyStorage(&c.key.PrivateKey, c.privateTokenStore, c.cfgNetmap.state) - clientConstructor := &reputationClientConstructor{ - log: c.log, - nmSrc: c.netMapSource, - netState: c.cfgNetmap.state, - trustStorage: c.cfgReputation.localTrustStorage, - basicConstructor: c.bgClientCache, - } + c.replicator = createReplicator(c, keyStorage, c.bgClientCache) - coreConstructor := &coreClientConstructor{ - log: c.log, - nmSrc: c.netMapSource, - netState: c.cfgNetmap.state, - trustStorage: c.cfgReputation.localTrustStorage, - basicConstructor: c.clientCache, - } - - c.replicator = createReplicator(c, keyStorage, clientConstructor) - - addPolicer(c, keyStorage, clientConstructor) + addPolicer(c, keyStorage, c.bgClientCache) traverseGen := util.NewTraverserGenerator(c.netMapSource, c.cfgObject.cnrSource, c) @@ -193,11 +160,11 @@ func initObjectService(c *cfg) { sPutV2 := createPutSvcV2(sPut, keyStorage) - sSearch := createSearchSvc(c, keyStorage, traverseGen, coreConstructor) + sSearch := createSearchSvc(c, keyStorage, traverseGen, c.clientCache) sSearchV2 := createSearchSvcV2(sSearch, keyStorage) - sGet := createGetService(c, keyStorage, traverseGen, coreConstructor) + sGet := createGetService(c, keyStorage, traverseGen, c.clientCache) *c.cfgObject.getSvc = *sGet // need smth better @@ -236,7 +203,7 @@ func initObjectService(c *cfg) { } } -func addPolicer(c *cfg, keyStorage *util.KeyStorage, clientConstructor *reputationClientConstructor) { +func addPolicer(c *cfg, keyStorage *util.KeyStorage, clientConstructor *cache.ClientCache) { ls := c.cfgObject.cfgLocalStorage.localStorage pol := policer.New( @@ -288,7 +255,7 @@ func createInnerRingFetcher(c *cfg) v2.InnerRingFetcher { } } -func createReplicator(c *cfg, keyStorage *util.KeyStorage, clientConstructor *reputationClientConstructor) *replicator.Replicator { +func createReplicator(c *cfg, keyStorage *util.KeyStorage, cache *cache.ClientCache) *replicator.Replicator { ls := c.cfgObject.cfgLocalStorage.localStorage return replicator.New( @@ -298,7 +265,7 @@ func createReplicator(c *cfg, keyStorage *util.KeyStorage, clientConstructor *re ), replicator.WithLocalStorage(ls), replicator.WithRemoteSender( - putsvc.NewRemoteSender(keyStorage, (*coreClientConstructor)(clientConstructor)), + putsvc.NewRemoteSender(keyStorage, cache), ), ) } @@ -319,17 +286,9 @@ func createPutSvc(c *cfg, keyStorage *util.KeyStorage) *putsvc.Service { } } - putConstructor := &coreClientConstructor{ - log: c.log, - nmSrc: c.netMapSource, - netState: c.cfgNetmap.state, - trustStorage: c.cfgReputation.localTrustStorage, - basicConstructor: c.putClientCache, - } - return putsvc.NewService( putsvc.WithKeyStorage(keyStorage), - putsvc.WithClientConstructor(putConstructor), + putsvc.WithClientConstructor(c.putClientCache), putsvc.WithMaxSizeSource(newCachedMaxObjectSizeSource(c)), putsvc.WithObjectStorage(os), putsvc.WithContainerSource(c.cfgObject.cnrSource), @@ -348,7 +307,7 @@ func createPutSvcV2(sPut *putsvc.Service, keyStorage *util.KeyStorage) *putsvcV2 ) } -func createSearchSvc(c *cfg, keyStorage *util.KeyStorage, traverseGen *util.TraverserGenerator, coreConstructor *coreClientConstructor) *searchsvc.Service { +func createSearchSvc(c *cfg, keyStorage *util.KeyStorage, traverseGen *util.TraverserGenerator, coreConstructor *cache.ClientCache) *searchsvc.Service { ls := c.cfgObject.cfgLocalStorage.localStorage return searchsvc.New( @@ -373,7 +332,7 @@ func createSearchSvcV2(sSearch *searchsvc.Service, keyStorage *util.KeyStorage) } func createGetService(c *cfg, keyStorage *util.KeyStorage, traverseGen *util.TraverserGenerator, - coreConstructor *coreClientConstructor) *getsvc.Service { + coreConstructor *cache.ClientCache) *getsvc.Service { ls := c.cfgObject.cfgLocalStorage.localStorage return getsvc.New( @@ -480,135 +439,6 @@ func (s *morphEACLFetcher) GetEACL(cnr cid.ID) (*containercore.EACL, error) { return eaclInfo, nil } -type reputationClientConstructor struct { - log *logger.Logger - - nmSrc netmap.Source - - netState netmap.State - - trustStorage *truststorage.Storage - - basicConstructor interface { - Get(coreclient.NodeInfo) (coreclient.Client, error) - } -} - -type reputationClient struct { - coreclient.MultiAddressClient - - prm truststorage.UpdatePrm - - cons *reputationClientConstructor -} - -func (c *reputationClient) submitResult(err error) { - currEpoch := c.cons.netState.CurrentEpoch() - sat := err == nil - - c.cons.log.Debug( - "writing local reputation values", - zap.Uint64("epoch", currEpoch), - zap.Bool("satisfactory", sat), - ) - - prm := c.prm - prm.SetSatisfactory(sat) - prm.SetEpoch(currEpoch) - - c.cons.trustStorage.Update(prm) -} - -func (c *reputationClient) ObjectPutInit(ctx context.Context, prm client.PrmObjectPutInit) (*client.ObjectWriter, error) { - res, err := c.MultiAddressClient.ObjectPutInit(ctx, prm) - - // FIXME: (neofs-node#1193) here we submit only initialization errors, writing errors are not processed - c.submitResult(err) - - return res, err -} - -func (c *reputationClient) ObjectDelete(ctx context.Context, prm client.PrmObjectDelete) (*client.ResObjectDelete, error) { - res, err := c.MultiAddressClient.ObjectDelete(ctx, prm) - if err != nil { - c.submitResult(err) - } else { - c.submitResult(apistatus.ErrFromStatus(res.Status())) - } - - return res, err -} - -func (c *reputationClient) GetObjectInit(ctx context.Context, prm client.PrmObjectGet) (*client.ObjectReader, error) { - res, err := c.MultiAddressClient.ObjectGetInit(ctx, prm) - - // FIXME: (neofs-node#1193) here we submit only initialization errors, reading errors are not processed - c.submitResult(err) - - return res, err -} - -func (c *reputationClient) ObjectHead(ctx context.Context, prm client.PrmObjectHead) (*client.ResObjectHead, error) { - res, err := c.MultiAddressClient.ObjectHead(ctx, prm) - - c.submitResult(err) - - return res, err -} - -func (c *reputationClient) ObjectHash(ctx context.Context, prm client.PrmObjectHash) (*client.ResObjectHash, error) { - res, err := c.MultiAddressClient.ObjectHash(ctx, prm) - - c.submitResult(err) - - return res, err -} - -func (c *reputationClient) ObjectSearchInit(ctx context.Context, prm client.PrmObjectSearch) (*client.ObjectListReader, error) { - res, err := c.MultiAddressClient.ObjectSearchInit(ctx, prm) - - // FIXME: (neofs-node#1193) here we submit only initialization errors, reading errors are not processed - c.submitResult(err) - - return res, err -} - -func (c *reputationClientConstructor) Get(info coreclient.NodeInfo) (coreclient.Client, error) { - cl, err := c.basicConstructor.Get(info) - if err != nil { - return nil, err - } - - nm, err := netmap.GetLatestNetworkMap(c.nmSrc) - if err == nil { - key := info.PublicKey() - - nmNodes := nm.Nodes() - var peer apireputation.PeerID - - for i := range nmNodes { - if bytes.Equal(nmNodes[i].PublicKey(), key) { - peer.SetPublicKey(nmNodes[i].PublicKey()) - - prm := truststorage.UpdatePrm{} - prm.SetPeer(peer) - - return &reputationClient{ - MultiAddressClient: cl.(coreclient.MultiAddressClient), - prm: prm, - cons: c, - }, nil - } - } - } else { - c.log.Warn(logs.FrostFSNodeCouldNotGetLatestNetworkMapToOverloadTheClient, - zap.String("error", err.Error()), - ) - } - - return cl, nil -} - type engineWithNotifications struct { base putsvc.ObjectStorage nw notificationWriter diff --git a/cmd/frostfs-node/reputation.go b/cmd/frostfs-node/reputation.go deleted file mode 100644 index b3acf7eb0e..0000000000 --- a/cmd/frostfs-node/reputation.go +++ /dev/null @@ -1,386 +0,0 @@ -package main - -import ( - "context" - "fmt" - - v2reputation "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation" - v2reputationgrpc "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation/grpc" - "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/session" - "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/common" - intermediatereputation "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/intermediate" - localreputation "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/local" - "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/ticker" - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - repClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event/netmap" - grpcreputation "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/network/transport/reputation/grpc" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - reputationrouter "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common/router" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - eigentrustctrl "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/controller" - intermediateroutes "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/routes" - consumerstorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/consumers" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/daughters" - localtrustcontroller "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/controller" - localroutes "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/routes" - truststorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/storage" - reputationrpc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/rpc" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -func initReputationService(ctx context.Context, c *cfg) { - wrap, err := repClient.NewFromMorph(c.cfgMorph.client, c.cfgReputation.scriptHash, 0, repClient.TryNotary()) - fatalOnErr(err) - - localKey := c.key.PublicKey().Bytes() - - nmSrc := c.netMapSource - - // storing calculated trusts as a daughter - c.cfgReputation.localTrustStorage = truststorage.New( - truststorage.Prm{}, - ) - - daughterStorage := daughters.New(daughters.Prm{}) - consumerStorage := consumerstorage.New(consumerstorage.Prm{}) - - localTrustLogger := &logger.Logger{Logger: c.log.With(zap.String("trust_type", "local"))} - - managerBuilder := reputationcommon.NewManagerBuilder( - reputationcommon.ManagersPrm{ - NetMapSource: nmSrc, - }, - reputationcommon.WithLogger(c.log), - ) - - localRouteBuilder := localroutes.New( - localroutes.Prm{ - ManagerBuilder: managerBuilder, - Log: localTrustLogger, - }, - ) - - localTrustRouter := createLocalTrustRouter(c, localRouteBuilder, localTrustLogger, daughterStorage) - - intermediateTrustRouter := createIntermediateTrustRouter(c, consumerStorage, managerBuilder) - - eigenTrustController := createEigenTrustController(c, intermediateTrustRouter, localKey, wrap, daughterStorage, consumerStorage) - - c.cfgReputation.localTrustCtrl = createLocalTrustController(c, localTrustLogger, localKey, localTrustRouter) - - addReputationReportHandler(ctx, c) - - server := grpcreputation.New( - reputationrpc.NewSignService( - &c.key.PrivateKey, - reputationrpc.NewResponseService( - &reputationServer{ - cfg: c, - log: c.log, - localRouter: localTrustRouter, - intermediateRouter: intermediateTrustRouter, - routeBuilder: localRouteBuilder, - }, - c.respSvc, - ), - ), - ) - - for _, srv := range c.cfgGRPC.servers { - v2reputationgrpc.RegisterReputationServiceServer(srv, server) - } - - // initialize eigen trust block timer - newEigenTrustIterTimer(c) - - addEigenTrustEpochHandler(ctx, c, eigenTrustController) -} - -func addReputationReportHandler(ctx context.Context, c *cfg) { - addNewEpochAsyncNotificationHandler( - c, - func(ev event.Event) { - c.log.Debug(logs.FrostFSNodeStartReportingReputationOnNewEpochEvent) - - var reportPrm localtrustcontroller.ReportPrm - - // report collected values from previous epoch - reportPrm.SetEpoch(ev.(netmap.NewEpoch).EpochNumber() - 1) - - c.cfgReputation.localTrustCtrl.Report(ctx, reportPrm) - }, - ) -} - -func addEigenTrustEpochHandler(ctx context.Context, c *cfg, eigenTrustController *eigentrustctrl.Controller) { - addNewEpochAsyncNotificationHandler( - c, - func(e event.Event) { - epoch := e.(netmap.NewEpoch).EpochNumber() - - log := c.log.With(zap.Uint64("epoch", epoch)) - - duration, err := c.cfgNetmap.wrapper.EpochDuration() - if err != nil { - log.Debug(logs.FrostFSNodeCouldNotFetchEpochDuration, zap.Error(err)) - return - } - - iterations, err := c.cfgNetmap.wrapper.EigenTrustIterations() - if err != nil { - log.Debug(logs.FrostFSNodeCouldNotFetchIterationNumber, zap.Error(err)) - return - } - - epochTimer, err := ticker.NewIterationsTicker(duration, iterations, func() { - eigenTrustController.Continue(ctx, - eigentrustctrl.ContinuePrm{ - Epoch: epoch - 1, - }, - ) - }) - if err != nil { - log.Debug(logs.FrostFSNodeCouldNotCreateFixedEpochTimer, zap.Error(err)) - return - } - - c.cfgMorph.eigenTrustTicker.addEpochTimer(epoch, epochTimer) - }, - ) -} - -func createLocalTrustRouter(c *cfg, localRouteBuilder *localroutes.Builder, localTrustLogger *logger.Logger, daughterStorage *daughters.Storage) *reputationrouter.Router { - // storing received daughter(of current node) trusts as a manager - daughterStorageWriterProvider := &intermediatereputation.DaughterStorageWriterProvider{ - Log: c.log, - Storage: daughterStorage, - } - - remoteLocalTrustProvider := common.NewRemoteTrustProvider( - common.RemoteProviderPrm{ - NetmapKeys: c, - DeadEndProvider: daughterStorageWriterProvider, - ClientCache: c.bgClientCache, - WriterProvider: localreputation.NewRemoteProvider( - localreputation.RemoteProviderPrm{ - Key: &c.key.PrivateKey, - Log: localTrustLogger, - }, - ), - Log: localTrustLogger, - }, - ) - - localTrustRouter := reputationrouter.New( - reputationrouter.Prm{ - LocalServerInfo: c, - RemoteWriterProvider: remoteLocalTrustProvider, - Builder: localRouteBuilder, - }, - reputationrouter.WithLogger(localTrustLogger)) - return localTrustRouter -} - -func createIntermediateTrustRouter(c *cfg, consumerStorage *consumerstorage.Storage, managerBuilder reputationcommon.ManagerBuilder) *reputationrouter.Router { - intermediateTrustLogger := &logger.Logger{Logger: c.log.With(zap.String("trust_type", "intermediate"))} - - consumerStorageWriterProvider := &intermediatereputation.ConsumerStorageWriterProvider{ - Log: c.log, - Storage: consumerStorage, - } - - remoteIntermediateTrustProvider := common.NewRemoteTrustProvider( - common.RemoteProviderPrm{ - NetmapKeys: c, - DeadEndProvider: consumerStorageWriterProvider, - ClientCache: c.bgClientCache, - WriterProvider: intermediatereputation.NewRemoteProvider( - intermediatereputation.RemoteProviderPrm{ - Key: &c.key.PrivateKey, - Log: intermediateTrustLogger, - }, - ), - Log: intermediateTrustLogger, - }, - ) - - intermediateRouteBuilder := intermediateroutes.New( - intermediateroutes.Prm{ - ManagerBuilder: managerBuilder, - Log: intermediateTrustLogger, - }, - ) - - intermediateTrustRouter := reputationrouter.New( - reputationrouter.Prm{ - LocalServerInfo: c, - RemoteWriterProvider: remoteIntermediateTrustProvider, - Builder: intermediateRouteBuilder, - }, - reputationrouter.WithLogger(intermediateTrustLogger), - ) - return intermediateTrustRouter -} - -func createEigenTrustController(c *cfg, intermediateTrustRouter *reputationrouter.Router, localKey []byte, wrap *repClient.Client, - daughterStorage *daughters.Storage, consumerStorage *consumerstorage.Storage) *eigentrustctrl.Controller { - eigenTrustCalculator := eigentrustcalc.New( - eigentrustcalc.Prm{ - AlphaProvider: c.cfgNetmap.wrapper, - InitialTrustSource: intermediatereputation.InitialTrustSource{ - NetMap: c.netMapSource, - }, - IntermediateValueTarget: intermediateTrustRouter, - WorkerPool: c.cfgReputation.workerPool, - FinalResultTarget: intermediatereputation.NewFinalWriterProvider( - intermediatereputation.FinalWriterProviderPrm{ - PrivatKey: &c.key.PrivateKey, - PubKey: localKey, - Client: wrap, - }, - intermediatereputation.FinalWriterWithLogger(c.log), - ), - DaughterTrustSource: &intermediatereputation.DaughterTrustIteratorProvider{ - DaughterStorage: daughterStorage, - ConsumerStorage: consumerStorage, - }, - }, - eigentrustcalc.WithLogger(c.log), - ) - - eigenTrustController := eigentrustctrl.New( - eigentrustctrl.Prm{ - DaughtersTrustCalculator: &intermediatereputation.DaughtersTrustCalculator{ - Calculator: eigenTrustCalculator, - }, - IterationsProvider: c.cfgNetmap.wrapper, - WorkerPool: c.cfgReputation.workerPool, - }, - eigentrustctrl.WithLogger(c.log), - ) - return eigenTrustController -} - -func createLocalTrustController(c *cfg, localTrustLogger *logger.Logger, localKey []byte, localTrustRouter *reputationrouter.Router) *localtrustcontroller.Controller { - localTrustStorage := &localreputation.TrustStorage{ - Log: localTrustLogger, - Storage: c.cfgReputation.localTrustStorage, - NmSrc: c.netMapSource, - LocalKey: localKey, - } - - return localtrustcontroller.New( - localtrustcontroller.Prm{ - LocalTrustSource: localTrustStorage, - LocalTrustTarget: localTrustRouter, - }, - localtrustcontroller.WithLogger(c.log), - ) -} - -type reputationServer struct { - *cfg - log *logger.Logger - localRouter *reputationrouter.Router - intermediateRouter *reputationrouter.Router - routeBuilder reputationrouter.Builder -} - -func (s *reputationServer) AnnounceLocalTrust(ctx context.Context, req *v2reputation.AnnounceLocalTrustRequest) (*v2reputation.AnnounceLocalTrustResponse, error) { - passedRoute := reverseRoute(req.GetVerificationHeader()) - passedRoute = append(passedRoute, s) - - body := req.GetBody() - - ep := &common.EpochProvider{ - E: body.GetEpoch(), - } - - w, err := s.localRouter.InitWriter(reputationrouter.NewRouteInfo(ep, passedRoute)) - if err != nil { - return nil, fmt.Errorf("could not initialize local trust writer: %w", err) - } - - for _, trust := range body.GetTrusts() { - err = s.processLocalTrust(ctx, body.GetEpoch(), apiToLocalTrust(&trust, passedRoute[0].PublicKey()), passedRoute, w) - if err != nil { - return nil, fmt.Errorf("could not write one of local trusts: %w", err) - } - } - - resp := new(v2reputation.AnnounceLocalTrustResponse) - resp.SetBody(new(v2reputation.AnnounceLocalTrustResponseBody)) - - return resp, nil -} - -func (s *reputationServer) AnnounceIntermediateResult(ctx context.Context, req *v2reputation.AnnounceIntermediateResultRequest) (*v2reputation.AnnounceIntermediateResultResponse, error) { - passedRoute := reverseRoute(req.GetVerificationHeader()) - passedRoute = append(passedRoute, s) - - body := req.GetBody() - - ei := eigentrust.NewEpochIteration(body.GetEpoch(), body.GetIteration()) - - w, err := s.intermediateRouter.InitWriter(reputationrouter.NewRouteInfo(ei, passedRoute)) - if err != nil { - return nil, fmt.Errorf("could not initialize trust writer: %w", err) - } - - v2Trust := body.GetTrust() - - trust := apiToLocalTrust(v2Trust.GetTrust(), v2Trust.GetTrustingPeer().GetPublicKey()) - - err = w.Write(ctx, trust) - if err != nil { - return nil, fmt.Errorf("could not write trust: %w", err) - } - - resp := new(v2reputation.AnnounceIntermediateResultResponse) - resp.SetBody(new(v2reputation.AnnounceIntermediateResultResponseBody)) - - return resp, nil -} - -func (s *reputationServer) processLocalTrust(ctx context.Context, epoch uint64, t reputation.Trust, - passedRoute []reputationcommon.ServerInfo, w reputationcommon.Writer) error { - err := reputationrouter.CheckRoute(s.routeBuilder, epoch, t, passedRoute) - if err != nil { - return fmt.Errorf("wrong route of reputation trust value: %w", err) - } - - return w.Write(ctx, t) -} - -// apiToLocalTrust converts v2 Trust to local reputation.Trust, adding trustingPeer. -func apiToLocalTrust(t *v2reputation.Trust, trustingPeer []byte) reputation.Trust { - var trusted, trusting apireputation.PeerID - trusted.SetPublicKey(t.GetPeer().GetPublicKey()) - trusting.SetPublicKey(trustingPeer) - - localTrust := reputation.Trust{} - - localTrust.SetValue(reputation.TrustValueFromFloat64(t.GetValue())) - localTrust.SetPeer(trusted) - localTrust.SetTrustingPeer(trusting) - - return localTrust -} - -func reverseRoute(hdr *session.RequestVerificationHeader) (passedRoute []reputationcommon.ServerInfo) { - for hdr != nil { - passedRoute = append(passedRoute, &common.OnlyKeyRemoteServerInfo{ - Key: hdr.GetBodySignature().GetKey(), - }) - - hdr = hdr.GetOrigin() - } - - return -} diff --git a/cmd/frostfs-node/reputation/common/remote.go b/cmd/frostfs-node/reputation/common/remote.go deleted file mode 100644 index f1982301f2..0000000000 --- a/cmd/frostfs-node/reputation/common/remote.go +++ /dev/null @@ -1,101 +0,0 @@ -package common - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/netmap" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - trustcontroller "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/controller" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" -) - -type clientCache interface { - Get(client.NodeInfo) (client.Client, error) -} - -// clientKeyRemoteProvider must provide a remote writer and take into account -// that requests must be sent via the passed api client and must be signed with -// the passed private key. -type clientKeyRemoteProvider interface { - WithClient(client.Client) reputationcommon.WriterProvider -} - -// RemoteTrustProvider is an implementation of reputation RemoteWriterProvider interface. -// It caches clients, checks if it is the end of the route and checks either the current -// node is a remote target or not. -// -// remoteTrustProvider requires to be provided with clientKeyRemoteProvider. -type RemoteTrustProvider struct { - netmapKeys netmap.AnnouncedKeys - deadEndProvider reputationcommon.WriterProvider - clientCache clientCache - remoteProvider clientKeyRemoteProvider - log *logger.Logger -} - -// RemoteProviderPrm groups the required parameters of the remoteTrustProvider's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type RemoteProviderPrm struct { - NetmapKeys netmap.AnnouncedKeys - DeadEndProvider reputationcommon.WriterProvider - ClientCache clientCache - WriterProvider clientKeyRemoteProvider - Log *logger.Logger -} - -func NewRemoteTrustProvider(prm RemoteProviderPrm) *RemoteTrustProvider { - switch { - case prm.NetmapKeys == nil: - PanicOnPrmValue("NetmapKeys", prm.NetmapKeys) - case prm.DeadEndProvider == nil: - PanicOnPrmValue("DeadEndProvider", prm.DeadEndProvider) - case prm.ClientCache == nil: - PanicOnPrmValue("ClientCache", prm.ClientCache) - case prm.WriterProvider == nil: - PanicOnPrmValue("WriterProvider", prm.WriterProvider) - case prm.Log == nil: - PanicOnPrmValue("Logger", prm.Log) - } - - return &RemoteTrustProvider{ - netmapKeys: prm.NetmapKeys, - deadEndProvider: prm.DeadEndProvider, - clientCache: prm.ClientCache, - remoteProvider: prm.WriterProvider, - log: prm.Log, - } -} - -func (rtp *RemoteTrustProvider) InitRemote(srv reputationcommon.ServerInfo) (reputationcommon.WriterProvider, error) { - rtp.log.Debug(logs.CommonInitializingRemoteWriterProvider) - - if srv == nil { - rtp.log.Debug(logs.CommonRouteHasReachedDeadendProvider) - return rtp.deadEndProvider, nil - } - - if rtp.netmapKeys.IsLocalKey(srv.PublicKey()) { - // if local => return no-op writer - rtp.log.Debug(logs.CommonInitializingNoopWriterProvider) - return trustcontroller.SimpleWriterProvider(new(NopReputationWriter)), nil - } - - var info client.NodeInfo - - err := client.NodeInfoFromRawNetmapElement(&info, srv) - if err != nil { - return nil, fmt.Errorf("parse client node info: %w", err) - } - - c, err := rtp.clientCache.Get(info) - if err != nil { - return nil, fmt.Errorf("could not initialize API client: %w", err) - } - - return rtp.remoteProvider.WithClient(c), nil -} diff --git a/cmd/frostfs-node/reputation/common/util.go b/cmd/frostfs-node/reputation/common/util.go deleted file mode 100644 index 443adb3881..0000000000 --- a/cmd/frostfs-node/reputation/common/util.go +++ /dev/null @@ -1,53 +0,0 @@ -package common - -import ( - "context" - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" -) - -type EpochProvider struct { - E uint64 -} - -func (ep *EpochProvider) Epoch() uint64 { - return ep.E -} - -type NopReputationWriter struct{} - -func (NopReputationWriter) Write(context.Context, reputation.Trust) error { - return nil -} - -func (NopReputationWriter) Close(context.Context) error { - return nil -} - -// OnlyKeyRemoteServerInfo is an implementation of reputation.ServerInfo -// interface but with only public key data. -type OnlyKeyRemoteServerInfo struct { - Key []byte -} - -func (i *OnlyKeyRemoteServerInfo) PublicKey() []byte { - return i.Key -} - -func (*OnlyKeyRemoteServerInfo) IterateAddresses(func(string) bool) { -} - -func (*OnlyKeyRemoteServerInfo) NumberOfAddresses() int { - return 0 -} - -func (*OnlyKeyRemoteServerInfo) ExternalAddresses() []string { - return nil -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func PanicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} diff --git a/cmd/frostfs-node/reputation/intermediate/calculator.go b/cmd/frostfs-node/reputation/intermediate/calculator.go deleted file mode 100644 index 73dd12311f..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/calculator.go +++ /dev/null @@ -1,57 +0,0 @@ -package intermediate - -import ( - "context" - "errors" - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/netmap" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - eigencalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - eigentrustctrl "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/controller" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// InitialTrustSource is an implementation of the -// reputation/eigentrust/calculator's InitialTrustSource interface. -type InitialTrustSource struct { - NetMap netmap.Source -} - -var ErrEmptyNetMap = errors.New("empty NepMap") - -// InitialTrust returns `initialTrust` as an initial trust value. -func (i InitialTrustSource) InitialTrust(apireputation.PeerID) (reputation.TrustValue, error) { - nm, err := i.NetMap.GetNetMap(1) - if err != nil { - return reputation.TrustZero, fmt.Errorf("failed to get NetMap: %w", err) - } - - nodeCount := reputation.TrustValueFromFloat64(float64(len(nm.Nodes()))) - if nodeCount == 0 { - return reputation.TrustZero, ErrEmptyNetMap - } - - return reputation.TrustOne.Div(nodeCount), nil -} - -// DaughtersTrustCalculator wraps EigenTrust calculator and implements the -// eigentrust/calculator's DaughtersTrustCalculator interface. -type DaughtersTrustCalculator struct { - Calculator *eigencalc.Calculator -} - -// Calculate converts and passes values to the wrapped calculator. -func (c *DaughtersTrustCalculator) Calculate(ctx context.Context, iterCtx eigentrustctrl.IterationContext) { - calcPrm := eigencalc.CalculatePrm{} - epochIteration := eigentrust.EpochIteration{} - - epochIteration.SetEpoch(iterCtx.Epoch()) - epochIteration.SetI(iterCtx.I()) - - calcPrm.SetLast(iterCtx.Last()) - calcPrm.SetEpochIteration(epochIteration) - - c.Calculator.Calculate(ctx, calcPrm) -} diff --git a/cmd/frostfs-node/reputation/intermediate/consumers.go b/cmd/frostfs-node/reputation/intermediate/consumers.go deleted file mode 100644 index 02cdb2a2b5..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/consumers.go +++ /dev/null @@ -1,66 +0,0 @@ -package intermediate - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - eigencalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - consumerstorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/consumers" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -var ErrIncorrectContextPanicMsg = "could not write intermediate trust: passed context incorrect" - -// ConsumerStorageWriterProvider is an implementation of the reputation.WriterProvider -// interface that provides ConsumerTrustWriter writer. -type ConsumerStorageWriterProvider struct { - Log *logger.Logger - Storage *consumerstorage.Storage -} - -// ConsumerTrustWriter is an implementation of the reputation.Writer interface -// that writes passed consumer's Trust values to the Consumer storage. After writing -// that, values can be used in eigenTrust algorithm's iterations. -type ConsumerTrustWriter struct { - log *logger.Logger - storage *consumerstorage.Storage - iterInfo eigencalc.EpochIterationInfo -} - -func (w *ConsumerTrustWriter) Write(_ context.Context, t reputation.Trust) error { - w.log.Debug(logs.IntermediateWritingReceivedConsumersTrusts, - zap.Uint64("epoch", w.iterInfo.Epoch()), - zap.Uint32("iteration", w.iterInfo.I()), - zap.Stringer("trusting_peer", t.TrustingPeer()), - zap.Stringer("trusted_peer", t.Peer()), - ) - - trust := eigentrust.IterationTrust{Trust: t} - - trust.SetEpoch(w.iterInfo.Epoch()) - trust.SetI(w.iterInfo.I()) - - w.storage.Put(trust) - return nil -} - -func (w *ConsumerTrustWriter) Close(context.Context) error { - return nil -} - -func (s *ConsumerStorageWriterProvider) InitWriter(ep reputationcommon.EpochProvider) (reputationcommon.Writer, error) { - iterInfo, ok := ep.(eigencalc.EpochIterationInfo) - if !ok { - panic(ErrIncorrectContextPanicMsg) - } - - return &ConsumerTrustWriter{ - log: s.Log, - storage: s.Storage, - iterInfo: iterInfo, - }, nil -} diff --git a/cmd/frostfs-node/reputation/intermediate/contract.go b/cmd/frostfs-node/reputation/intermediate/contract.go deleted file mode 100644 index 2d83598bcf..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/contract.go +++ /dev/null @@ -1,147 +0,0 @@ -package intermediate - -import ( - "crypto/ecdsa" - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - repClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - frostfsecdsa "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/crypto/ecdsa" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -// FinalWriterProviderPrm groups the required parameters of the FinalWriterProvider's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type FinalWriterProviderPrm struct { - PrivatKey *ecdsa.PrivateKey - PubKey []byte - Client *repClient.Client -} - -// NewFinalWriterProvider creates a new instance of the FinalWriterProvider. -// -// Panics if at least one value of the parameters is invalid. -// -// The created FinalWriterProvider does not require additional -// initialization and is completely ready for work. -func NewFinalWriterProvider(prm FinalWriterProviderPrm, opts ...FinalWriterOption) *FinalWriterProvider { - o := defaultFinalWriterOptionsOpts() - - for i := range opts { - opts[i](o) - } - - return &FinalWriterProvider{ - prm: prm, - opts: o, - } -} - -// FinalWriterProvider is an implementation of the reputation.eigentrust.calculator -// IntermediateWriterProvider interface. It inits FinalWriter. -type FinalWriterProvider struct { - prm FinalWriterProviderPrm - opts *finalWriterOptions -} - -func (fwp FinalWriterProvider) InitIntermediateWriter( - _ eigentrustcalc.EpochIterationInfo) (eigentrustcalc.IntermediateWriter, error) { - return &FinalWriter{ - privatKey: fwp.prm.PrivatKey, - pubKey: fwp.prm.PubKey, - client: fwp.prm.Client, - l: fwp.opts.log, - }, nil -} - -// FinalWriter is an implementation of the reputation.eigentrust.calculator IntermediateWriter -// interface that writes GlobalTrust to contract directly. -type FinalWriter struct { - privatKey *ecdsa.PrivateKey - pubKey []byte - client *repClient.Client - - l *logger.Logger -} - -func (fw FinalWriter) WriteIntermediateTrust(t eigentrust.IterationTrust) error { - fw.l.Debug(logs.IntermediateStartWritingGlobalTrustsToContract) - - args := repClient.PutPrm{} - - apiTrustedPeerID := t.Peer() - - var apiTrust apireputation.Trust - apiTrust.SetValue(t.Value().Float64()) - apiTrust.SetPeer(t.Peer()) - - var managerPublicKey [33]byte - copy(managerPublicKey[:], fw.pubKey) - - var apiMangerPeerID apireputation.PeerID - apiMangerPeerID.SetPublicKey(managerPublicKey[:]) - - var gTrust apireputation.GlobalTrust - gTrust.SetTrust(apiTrust) - gTrust.SetManager(apiMangerPeerID) - - err := gTrust.Sign(frostfsecdsa.Signer(*fw.privatKey)) - if err != nil { - fw.l.Debug( - "failed to sign global trust", - zap.Error(err), - ) - return fmt.Errorf("failed to sign global trust: %w", err) - } - - args.SetEpoch(t.Epoch()) - args.SetValue(gTrust) - args.SetPeerID(apiTrustedPeerID) - - err = fw.client.Put( - args, - ) - if err != nil { - fw.l.Debug( - "failed to write global trust to contract", - zap.Error(err), - ) - return fmt.Errorf("failed to write global trust to contract: %w", err) - } - - fw.l.Debug( - "sent global trust to contract", - zap.Uint64("epoch", t.Epoch()), - zap.Float64("value", t.Value().Float64()), - zap.Stringer("peer", t.Peer()), - ) - - return nil -} - -type finalWriterOptions struct { - log *logger.Logger -} - -type FinalWriterOption func(*finalWriterOptions) - -func defaultFinalWriterOptionsOpts() *finalWriterOptions { - return &finalWriterOptions{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -func FinalWriterWithLogger(l *logger.Logger) FinalWriterOption { - return func(o *finalWriterOptions) { - if l != nil { - o.log = l - } - } -} diff --git a/cmd/frostfs-node/reputation/intermediate/daughters.go b/cmd/frostfs-node/reputation/intermediate/daughters.go deleted file mode 100644 index 30237537c2..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/daughters.go +++ /dev/null @@ -1,51 +0,0 @@ -package intermediate - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/daughters" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// DaughterStorageWriterProvider is an implementation of the reputation.WriterProvider -// interface that provides DaughterTrustWriter writer. -type DaughterStorageWriterProvider struct { - Log *logger.Logger - Storage *daughters.Storage -} - -// DaughterTrustWriter is an implementation of the reputation.Writer interface -// that writes passed daughter's Trust values to Daughter storage. After writing -// that, values can be used in eigenTrust algorithm's iterations. -type DaughterTrustWriter struct { - log *logger.Logger - storage *daughters.Storage - ep reputationcommon.EpochProvider -} - -func (w *DaughterTrustWriter) Write(_ context.Context, t reputation.Trust) error { - w.log.Debug(logs.IntermediateWritingReceivedDaughtersTrusts, - zap.Uint64("epoch", w.ep.Epoch()), - zap.Stringer("trusting_peer", t.TrustingPeer()), - zap.Stringer("trusted_peer", t.Peer()), - ) - - w.storage.Put(w.ep.Epoch(), t) - return nil -} - -func (w *DaughterTrustWriter) Close(context.Context) error { - return nil -} - -func (s *DaughterStorageWriterProvider) InitWriter(ep reputationcommon.EpochProvider) (reputationcommon.Writer, error) { - return &DaughterTrustWriter{ - log: s.Log, - storage: s.Storage, - ep: ep, - }, nil -} diff --git a/cmd/frostfs-node/reputation/intermediate/remote.go b/cmd/frostfs-node/reputation/intermediate/remote.go deleted file mode 100644 index 8087463b51..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/remote.go +++ /dev/null @@ -1,125 +0,0 @@ -package intermediate - -import ( - "context" - "crypto/ecdsa" - - "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/common" - internalclient "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/internal/client" - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - coreclient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - reputationapi "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -// RemoteProviderPrm groups the required parameters of the RemoteProvider's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type RemoteProviderPrm struct { - Key *ecdsa.PrivateKey - Log *logger.Logger -} - -// NewRemoteProvider creates a new instance of the RemoteProvider. -// -// Panics if at least one value of the parameters is invalid. -// -// The created RemoteProvider does not require additional -// initialization and is completely ready for work. -func NewRemoteProvider(prm RemoteProviderPrm) *RemoteProvider { - switch { - case prm.Key == nil: - common.PanicOnPrmValue("NetMapSource", prm.Key) - case prm.Log == nil: - common.PanicOnPrmValue("Logger", prm.Log) - } - - return &RemoteProvider{ - key: prm.Key, - log: prm.Log, - } -} - -// RemoteProvider is an implementation of the clientKeyRemoteProvider interface. -type RemoteProvider struct { - key *ecdsa.PrivateKey - log *logger.Logger -} - -func (rp RemoteProvider) WithClient(c coreclient.Client) reputationcommon.WriterProvider { - return &TrustWriterProvider{ - client: c, - key: rp.key, - log: rp.log, - } -} - -type TrustWriterProvider struct { - client coreclient.Client - key *ecdsa.PrivateKey - log *logger.Logger -} - -func (twp *TrustWriterProvider) InitWriter(ep reputationcommon.EpochProvider) (reputationcommon.Writer, error) { - iterInfo, ok := ep.(eigentrustcalc.EpochIterationInfo) - if !ok { - // TODO: #1164 think if this can be done without such limitation - panic(ErrIncorrectContextPanicMsg) - } - - return &RemoteTrustWriter{ - iterInfo: iterInfo, - client: twp.client, - key: twp.key, - log: twp.log, - }, nil -} - -type RemoteTrustWriter struct { - iterInfo eigentrustcalc.EpochIterationInfo - client coreclient.Client - key *ecdsa.PrivateKey - log *logger.Logger -} - -// Write sends a trust value to a remote node via ReputationService.AnnounceIntermediateResult RPC. -func (rtp *RemoteTrustWriter) Write(ctx context.Context, t reputation.Trust) error { - epoch := rtp.iterInfo.Epoch() - i := rtp.iterInfo.I() - - rtp.log.Debug(logs.IntermediateAnnouncingTrust, - zap.Uint64("epoch", epoch), - zap.Uint32("iteration", i), - zap.Stringer("trusting_peer", t.TrustingPeer()), - zap.Stringer("trusted_peer", t.Peer()), - ) - - var apiTrust reputationapi.Trust - apiTrust.SetValue(t.Value().Float64()) - apiTrust.SetPeer(t.Peer()) - - var apiPeerToPeerTrust reputationapi.PeerToPeerTrust - apiPeerToPeerTrust.SetTrustingPeer(t.TrustingPeer()) - apiPeerToPeerTrust.SetTrust(apiTrust) - - var p internalclient.AnnounceIntermediatePrm - - p.SetClient(rtp.client) - p.SetEpoch(epoch) - p.SetIteration(i) - p.SetTrust(apiPeerToPeerTrust) - - _, err := internalclient.AnnounceIntermediate(ctx, p) - - return err -} - -func (rtp *RemoteTrustWriter) Close(context.Context) error { - return nil -} diff --git a/cmd/frostfs-node/reputation/intermediate/storage.go b/cmd/frostfs-node/reputation/intermediate/storage.go deleted file mode 100644 index db29ff92b4..0000000000 --- a/cmd/frostfs-node/reputation/intermediate/storage.go +++ /dev/null @@ -1,64 +0,0 @@ -package intermediate - -import ( - "fmt" - - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - consumerstorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/consumers" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/storage/daughters" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// DaughterTrustIteratorProvider is an implementation of the -// reputation/eigentrust/calculator's DaughterTrustIteratorProvider interface. -type DaughterTrustIteratorProvider struct { - DaughterStorage *daughters.Storage - ConsumerStorage *consumerstorage.Storage -} - -// InitDaughterIterator returns an iterator over the received -// local trusts for ctx.Epoch() epoch from daughter p. -func (ip *DaughterTrustIteratorProvider) InitDaughterIterator(ctx eigentrustcalc.EpochIterationInfo, - p apireputation.PeerID) (eigentrustcalc.TrustIterator, error) { - epoch := ctx.Epoch() - - daughterIterator, ok := ip.DaughterStorage.DaughterTrusts(epoch, p) - if !ok { - return nil, fmt.Errorf("no data in %d epoch for daughter: %s", epoch, p) - } - - return daughterIterator, nil -} - -// InitAllDaughtersIterator returns an iterator over all -// daughters of the current node(manager) and all local -// trusts received from them for ctx.Epoch() epoch. -func (ip *DaughterTrustIteratorProvider) InitAllDaughtersIterator( - ctx eigentrustcalc.EpochIterationInfo) (eigentrustcalc.PeerTrustsIterator, error) { - epoch := ctx.Epoch() - - iter, ok := ip.DaughterStorage.AllDaughterTrusts(epoch) - if !ok { - return nil, fmt.Errorf("no data in %d epoch for daughters", epoch) - } - - return iter, nil -} - -// InitConsumersIterator returns an iterator over all daughters -// of the current node(manager) and all their consumers' local -// trusts for ctx.Epoch() epoch and ctx.I() iteration. -func (ip *DaughterTrustIteratorProvider) InitConsumersIterator( - ctx eigentrustcalc.EpochIterationInfo) (eigentrustcalc.PeerTrustsIterator, error) { - epoch, iter := ctx.Epoch(), ctx.I() - - consumerIterator, ok := ip.ConsumerStorage.Consumers(epoch, iter) - if !ok { - return nil, fmt.Errorf("no data for %d iteration in %d epoch for consumers's trusts", - iter, - epoch, - ) - } - - return consumerIterator, nil -} diff --git a/cmd/frostfs-node/reputation/internal/client/client.go b/cmd/frostfs-node/reputation/internal/client/client.go deleted file mode 100644 index ff5131262a..0000000000 --- a/cmd/frostfs-node/reputation/internal/client/client.go +++ /dev/null @@ -1,101 +0,0 @@ -package internal - -import ( - "context" - - coreclient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client" - "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client" - apistatus "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client/status" - "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -type commonPrm struct { - cli coreclient.Client -} - -// SetClient sets the base client for FrostFS API communication. -// -// Required parameter. -func (x *commonPrm) SetClient(cli coreclient.Client) { - x.cli = cli -} - -// AnnounceLocalPrm groups parameters of AnnounceLocal operation. -type AnnounceLocalPrm struct { - commonPrm - - cliPrm client.PrmAnnounceLocalTrust -} - -// SetEpoch sets the epoch in which the trust was assessed. -func (x *AnnounceLocalPrm) SetEpoch(epoch uint64) { - x.cliPrm.SetEpoch(epoch) -} - -// SetTrusts sets a list of local trust values. -func (x *AnnounceLocalPrm) SetTrusts(ts []reputation.Trust) { - x.cliPrm.SetValues(ts) -} - -// AnnounceLocalRes groups the resulting values of AnnounceLocal operation. -type AnnounceLocalRes struct{} - -// AnnounceLocal sends estimations of local trust to the remote node. -// -// Client, context and key must be set. -// -// Returns any error which prevented the operation from completing correctly in error return. -func AnnounceLocal(ctx context.Context, prm AnnounceLocalPrm) (res AnnounceLocalRes, err error) { - var cliRes *client.ResAnnounceLocalTrust - - cliRes, err = prm.cli.AnnounceLocalTrust(ctx, prm.cliPrm) - if err == nil { - // pull out an error from status - err = apistatus.ErrFromStatus(cliRes.Status()) - } - - return -} - -// AnnounceIntermediatePrm groups parameters of AnnounceIntermediate operation. -type AnnounceIntermediatePrm struct { - commonPrm - - cliPrm client.PrmAnnounceIntermediateTrust -} - -// SetEpoch sets the number of the epoch when the trust calculation's iteration was executed. -func (x *AnnounceIntermediatePrm) SetEpoch(epoch uint64) { - x.cliPrm.SetEpoch(epoch) -} - -// SetIteration sets the number of the iteration of the trust calculation algorithm. -func (x *AnnounceIntermediatePrm) SetIteration(iter uint32) { - x.cliPrm.SetIteration(iter) -} - -// SetTrust sets the current global trust value computed at the iteration. -func (x *AnnounceIntermediatePrm) SetTrust(t reputation.PeerToPeerTrust) { - x.cliPrm.SetCurrentValue(t) -} - -// AnnounceIntermediateRes groups the resulting values of AnnounceIntermediate operation. -type AnnounceIntermediateRes struct{} - -// AnnounceIntermediate sends the global trust value calculated at the specified iteration -// and epoch to to the remote node. -// -// Client, context and key must be set. -// -// Returns any error which prevented the operation from completing correctly in error return. -func AnnounceIntermediate(ctx context.Context, prm AnnounceIntermediatePrm) (res AnnounceIntermediateRes, err error) { - var cliRes *client.ResAnnounceIntermediateTrust - - cliRes, err = prm.cli.AnnounceIntermediateTrust(ctx, prm.cliPrm) - if err == nil { - // pull out an error from status - err = apistatus.ErrFromStatus(cliRes.Status()) - } - - return -} diff --git a/cmd/frostfs-node/reputation/internal/client/doc.go b/cmd/frostfs-node/reputation/internal/client/doc.go deleted file mode 100644 index 1dc66cee6a..0000000000 --- a/cmd/frostfs-node/reputation/internal/client/doc.go +++ /dev/null @@ -1,11 +0,0 @@ -// Package internal provides functionality for FrostFS Node Reputation system communication with FrostFS network. -// The base client for accessing remote nodes via FrostFS API is a FrostFS SDK Go API client. -// However, although it encapsulates a useful piece of business logic (e.g. the signature mechanism), -// the Reputation service does not fully use the client's flexible interface. -// -// In this regard, this package provides functions over base API client necessary for the application. -// This allows you to concentrate the entire spectrum of the client's use in one place (this will be convenient -// both when updating the base client and for evaluating the UX of SDK library). So, it is expected that all -// Reputation service packages will be limited to this package for the development of functionality requiring -// FrostFS API communication. -package internal diff --git a/cmd/frostfs-node/reputation/local/remote.go b/cmd/frostfs-node/reputation/local/remote.go deleted file mode 100644 index 6197c6d696..0000000000 --- a/cmd/frostfs-node/reputation/local/remote.go +++ /dev/null @@ -1,113 +0,0 @@ -package local - -import ( - "context" - "crypto/ecdsa" - - "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/common" - internalclient "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/internal/client" - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - coreclient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - reputationapi "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -// RemoteProviderPrm groups the required parameters of the RemoteProvider's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type RemoteProviderPrm struct { - Key *ecdsa.PrivateKey - Log *logger.Logger -} - -// NewRemoteProvider creates a new instance of the RemoteProvider. -// -// Panics if at least one value of the parameters is invalid. -// -// The created RemoteProvider does not require additional -// initialization and is completely ready for work. -func NewRemoteProvider(prm RemoteProviderPrm) *RemoteProvider { - switch { - case prm.Key == nil: - common.PanicOnPrmValue("NetMapSource", prm.Key) - case prm.Log == nil: - common.PanicOnPrmValue("Logger", prm.Log) - } - - return &RemoteProvider{ - key: prm.Key, - log: prm.Log, - } -} - -// RemoteProvider is an implementation of the clientKeyRemoteProvider interface. -type RemoteProvider struct { - key *ecdsa.PrivateKey - log *logger.Logger -} - -func (rp RemoteProvider) WithClient(c coreclient.Client) reputationcommon.WriterProvider { - return &TrustWriterProvider{ - client: c, - key: rp.key, - log: rp.log, - } -} - -type TrustWriterProvider struct { - client coreclient.Client - key *ecdsa.PrivateKey - log *logger.Logger -} - -func (twp *TrustWriterProvider) InitWriter(ep reputationcommon.EpochProvider) (reputationcommon.Writer, error) { - return &RemoteTrustWriter{ - ep: ep, - client: twp.client, - key: twp.key, - log: twp.log, - }, nil -} - -type RemoteTrustWriter struct { - ep reputationcommon.EpochProvider - client coreclient.Client - key *ecdsa.PrivateKey - log *logger.Logger - - buf []reputationapi.Trust -} - -func (rtp *RemoteTrustWriter) Write(_ context.Context, t reputation.Trust) error { - var apiTrust reputationapi.Trust - - apiTrust.SetValue(t.Value().Float64()) - apiTrust.SetPeer(t.Peer()) - - rtp.buf = append(rtp.buf, apiTrust) - - return nil -} - -func (rtp *RemoteTrustWriter) Close(ctx context.Context) error { - epoch := rtp.ep.Epoch() - - rtp.log.Debug(logs.LocalAnnouncingTrusts, - zap.Uint64("epoch", epoch), - ) - - var prm internalclient.AnnounceLocalPrm - - prm.SetClient(rtp.client) - prm.SetEpoch(epoch) - prm.SetTrusts(rtp.buf) - - _, err := internalclient.AnnounceLocal(ctx, prm) - - return err -} diff --git a/cmd/frostfs-node/reputation/local/storage.go b/cmd/frostfs-node/reputation/local/storage.go deleted file mode 100644 index a0dc3d4ce3..0000000000 --- a/cmd/frostfs-node/reputation/local/storage.go +++ /dev/null @@ -1,108 +0,0 @@ -package local - -import ( - "bytes" - "errors" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - netmapcore "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/netmap" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - trustcontroller "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/controller" - truststorage "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/local/storage" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -type TrustStorage struct { - Log *logger.Logger - - Storage *truststorage.Storage - - NmSrc netmapcore.Source - - LocalKey []byte -} - -func (s *TrustStorage) InitIterator(ep reputationcommon.EpochProvider) (trustcontroller.Iterator, error) { - epoch := ep.Epoch() - - s.Log.Debug(logs.LocalInitializingIteratorOverTrusts, - zap.Uint64("epoch", epoch), - ) - - epochStorage, err := s.Storage.DataForEpoch(epoch) - if err != nil && !errors.Is(err, truststorage.ErrNoPositiveTrust) { - return nil, err - } - - return &TrustIterator{ - ep: ep, - storage: s, - epochStorage: epochStorage, - }, nil -} - -type TrustIterator struct { - ep reputationcommon.EpochProvider - - storage *TrustStorage - - epochStorage *truststorage.EpochTrustValueStorage -} - -func (it *TrustIterator) Iterate(h reputation.TrustHandler) error { - if it.epochStorage != nil { - err := it.epochStorage.Iterate(h) - if !errors.Is(err, truststorage.ErrNoPositiveTrust) { - return err - } - } - - nm, err := it.storage.NmSrc.GetNetMapByEpoch(it.ep.Epoch()) - if err != nil { - return err - } - - // find out if local node is presented in netmap - localIndex := -1 - - nmNodes := nm.Nodes() - for i := range nmNodes { - if bytes.Equal(nmNodes[i].PublicKey(), it.storage.LocalKey) { - localIndex = i - break - } - } - - ln := len(nmNodes) - if localIndex >= 0 && ln > 0 { - ln-- - } - - // calculate Pj http://ilpubs.stanford.edu:8090/562/1/2002-56.pdf Chapter 4.5. - p := reputation.TrustOne.Div(reputation.TrustValueFromInt(ln)) - - for i := range nmNodes { - if i == localIndex { - continue - } - - var trusted, trusting apireputation.PeerID - - trusted.SetPublicKey(nmNodes[i].PublicKey()) - trusting.SetPublicKey(it.storage.LocalKey) - - trust := reputation.Trust{} - trust.SetPeer(trusted) - trust.SetValue(p) - trust.SetTrustingPeer(trusting) - - if err := h(trust); err != nil { - return err - } - } - - return nil -} diff --git a/cmd/frostfs-node/reputation/ticker/fixed.go b/cmd/frostfs-node/reputation/ticker/fixed.go deleted file mode 100644 index 5403882d50..0000000000 --- a/cmd/frostfs-node/reputation/ticker/fixed.go +++ /dev/null @@ -1,90 +0,0 @@ -package ticker - -import ( - "fmt" - "sync" -) - -// IterationHandler is a callback of a certain block advance. -type IterationHandler func() - -// IterationsTicker represents a fixed tick number block timer. -// -// It can tick the blocks and perform certain actions -// on block time intervals. -type IterationsTicker struct { - m sync.Mutex - - curr uint64 - period uint64 - - times uint64 - - h IterationHandler -} - -// NewIterationsTicker creates a new IterationsTicker. -// -// It guaranties that a handler would be called the -// specified amount of times in the specified amount -// of blocks. After the last meaningful Tick, IterationsTicker -// becomes no-op timer. -// -// Returns an error only if times is greater than totalBlocks. -func NewIterationsTicker(totalBlocks uint64, times uint64, h IterationHandler) (*IterationsTicker, error) { - period := totalBlocks / times - - if period == 0 { - return nil, fmt.Errorf("impossible to tick %d times in %d blocks", - times, totalBlocks, - ) - } - - var curr uint64 - - // try to make handler calls as rare as possible - if totalBlocks%times != 0 { - extraBlocks := (period+1)*times - totalBlocks - - if period >= extraBlocks { - curr = extraBlocks + (period-extraBlocks)/2 - period++ - } - } - - return &IterationsTicker{ - curr: curr, - period: period, - times: times, - h: h, - }, nil -} - -// Tick ticks one block in the IterationsTicker. -// -// Returns `false` if the timer has finished its operations -// and there will be no more handler calls. -// Calling Tick after the returned `false` is safe, no-op -// and also returns `false`. -func (ft *IterationsTicker) Tick() bool { - ft.m.Lock() - defer ft.m.Unlock() - - if ft.times == 0 { - return false - } - - ft.curr++ - - if ft.curr%ft.period == 0 { - ft.h() - - ft.times-- - - if ft.times == 0 { - return false - } - } - - return true -} diff --git a/cmd/frostfs-node/reputation/ticker/fixed_test.go b/cmd/frostfs-node/reputation/ticker/fixed_test.go deleted file mode 100644 index 25e9bd08f7..0000000000 --- a/cmd/frostfs-node/reputation/ticker/fixed_test.go +++ /dev/null @@ -1,118 +0,0 @@ -package ticker - -import ( - "errors" - "fmt" - "testing" - - "github.com/stretchr/testify/require" -) - -func TestFixedTimer_Tick(t *testing.T) { - tests := [...]struct { - duration uint64 - times uint64 - err error - }{ - { - duration: 20, - times: 4, - err: nil, - }, - { - duration: 6, - times: 6, - err: nil, - }, - { - duration: 10, - times: 6, - err: nil, - }, - { - duration: 5, - times: 6, - err: errors.New("impossible to tick 6 times in 5 blocks"), - }, - } - - for _, test := range tests { - t.Run(fmt.Sprintf("duration:%d,times:%d", test.duration, test.times), func(t *testing.T) { - counter := uint64(0) - - timer, err := NewIterationsTicker(test.duration, test.times, func() { - counter++ - }) - if test.err != nil { - require.EqualError(t, err, test.err.Error()) - return - } - - require.NoError(t, err) - - for i := 0; i < int(test.duration); i++ { - if !timer.Tick() { - break - } - } - - require.Equal(t, false, timer.Tick()) - require.Equal(t, test.times, counter) - }) - } -} - -func TestFixedTimer_RareCalls(t *testing.T) { - tests := [...]struct { - duration uint64 - times uint64 - firstCall uint64 - period uint64 - }{ - { - duration: 11, - times: 6, - firstCall: 1, - period: 2, - }, - { - duration: 11, - times: 4, - firstCall: 2, - period: 3, - }, - { - duration: 20, - times: 3, - firstCall: 4, - period: 7, - }, - } - - for _, test := range tests { - t.Run(fmt.Sprintf("duration:%d,times:%d", test.duration, test.times), func(t *testing.T) { - var counter uint64 - - timer, err := NewIterationsTicker(test.duration, test.times, func() { - counter++ - }) - require.NoError(t, err) - - checked := false - - for i := 1; i <= int(test.duration); i++ { - if !timer.Tick() { - break - } - - if !checked && counter == 1 { - require.Equal(t, test.firstCall, uint64(i)) - checked = true - } - } - - require.Equal(t, false, timer.Tick()) - require.Equal(t, test.times, counter) - }) - } -} diff --git a/cmd/frostfs-node/timers.go b/cmd/frostfs-node/timers.go deleted file mode 100644 index 2ee2e8656f..0000000000 --- a/cmd/frostfs-node/timers.go +++ /dev/null @@ -1,43 +0,0 @@ -package main - -import ( - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-node/reputation/ticker" -) - -type eigenTrustTickers struct { - m sync.Mutex - - timers map[uint64]*ticker.IterationsTicker -} - -func (e *eigenTrustTickers) addEpochTimer(epoch uint64, timer *ticker.IterationsTicker) { - e.m.Lock() - defer e.m.Unlock() - - e.timers[epoch] = timer -} - -func (e *eigenTrustTickers) tick() { - e.m.Lock() - defer e.m.Unlock() - - for epoch, t := range e.timers { - if !t.Tick() { - delete(e.timers, epoch) - } - } -} - -func tickBlockTimers(c *cfg) { - c.cfgMorph.eigenTrustTicker.tick() -} - -func newEigenTrustIterTimer(c *cfg) { - c.cfgMorph.eigenTrustTicker = &eigenTrustTickers{ - // it is expected to have max 2 concurrent epoch - // in normal mode work - timers: make(map[uint64]*ticker.IterationsTicker, 2), - } -} diff --git a/pkg/innerring/initialization.go b/pkg/innerring/initialization.go index 2f5e89e398..5ac3154bc8 100644 --- a/pkg/innerring/initialization.go +++ b/pkg/innerring/initialization.go @@ -18,7 +18,6 @@ import ( addrvalidator "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/netmap/nodevalidation/maddress" statevalidation "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/netmap/nodevalidation/state" subnetvalidator "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/netmap/nodevalidation/subnet" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/reputation" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/settlement" auditSettlement "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/innerring/processors/settlement/audit" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/metrics" @@ -29,13 +28,11 @@ import ( frostfsClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/frostfs" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/frostfsid" nmClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/netmap" - repClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/reputation" morphsubnet "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/subnet" "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event" audittask "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/audit/taskmanager" control "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/control/ir" controlsrv "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/control/ir/server" - reputationcommon "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" util2 "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util" utilConfig "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/config" "github.com/nspcc-dev/neo-go/pkg/core/transaction" @@ -467,33 +464,6 @@ func (s *Server) initFrostFSMainnetProcessor(cfg *viper.Viper, frostfsIDClient * return bindMainnetProcessor(frostfsProcessor, s) } -func (s *Server) initReputationProcessor(cfg *viper.Viper, sidechainFee fixedn.Fixed8) error { - repClient, err := repClient.NewFromMorph(s.morphClient, s.contracts.reputation, sidechainFee, repClient.TryNotary(), repClient.AsAlphabet()) - if err != nil { - return err - } - - // create reputation processor - reputationProcessor, err := reputation.New(&reputation.Params{ - Log: s.log, - PoolSize: cfg.GetInt("workers.reputation"), - EpochState: s, - AlphabetState: s, - ReputationWrapper: repClient, - ManagerBuilder: reputationcommon.NewManagerBuilder( - reputationcommon.ManagersPrm{ - NetMapSource: s.netmapClient, - }, - ), - NotaryDisabled: s.sideNotaryConfig.disabled, - }) - if err != nil { - return err - } - - return bindMorphProcessor(reputationProcessor, s) -} - func (s *Server) initGRPCServer(cfg *viper.Viper) error { controlSvcEndpoint := cfg.GetString("control.grpc.endpoint") if controlSvcEndpoint == "" { @@ -620,8 +590,6 @@ type serverProcessors struct { func (s *Server) initProcessors(cfg *viper.Viper, morphClients *serverMorphClients) (*serverProcessors, error) { result := &serverProcessors{} - fee := s.feeConfig.SideChainFee() - irf := s.createIRFetcher() s.statusIndex = newInnerRingIndexer( @@ -681,11 +649,6 @@ func (s *Server) initProcessors(cfg *viper.Viper, morphClients *serverMorphClien return nil, err } - err = s.initReputationProcessor(cfg, fee) - if err != nil { - return nil, err - } - return result, nil } diff --git a/pkg/innerring/processors/reputation/handlers.go b/pkg/innerring/processors/reputation/handlers.go deleted file mode 100644 index 9b8e7f66ad..0000000000 --- a/pkg/innerring/processors/reputation/handlers.go +++ /dev/null @@ -1,29 +0,0 @@ -package reputation - -import ( - "encoding/hex" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event" - reputationEvent "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event/reputation" - "go.uber.org/zap" -) - -func (rp *Processor) handlePutReputation(ev event.Event) { - put := ev.(reputationEvent.Put) - peerID := put.PeerID() - - // FIXME: #1147 do not use `ToV2` method outside frostfs-api-go library - rp.log.Info(logs.Notification, - zap.String("type", "reputation put"), - zap.String("peer_id", hex.EncodeToString(peerID.PublicKey()))) - - // send event to the worker pool - - err := rp.pool.Submit(func() { rp.processPut(&put) }) - if err != nil { - // there system can be moved into controlled degradation stage - rp.log.Warn(logs.ReputationReputationWorkerPoolDrained, - zap.Int("capacity", rp.pool.Cap())) - } -} diff --git a/pkg/innerring/processors/reputation/process_put.go b/pkg/innerring/processors/reputation/process_put.go deleted file mode 100644 index f8814dd06b..0000000000 --- a/pkg/innerring/processors/reputation/process_put.go +++ /dev/null @@ -1,99 +0,0 @@ -package reputation - -import ( - "bytes" - "encoding/hex" - "errors" - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - repClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/reputation" - reputationEvent "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event/reputation" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -var errWrongManager = errors.New("got manager that is incorrect for peer") - -func (rp *Processor) processPut(e *reputationEvent.Put) { - if !rp.alphabetState.IsAlphabet() { - rp.log.Info(logs.ReputationNonAlphabetModeIgnoreReputationPutNotification) - return - } - - epoch := e.Epoch() - id := e.PeerID() - value := e.Value() - - // check if epoch is valid - currentEpoch := rp.epochState.EpochCounter() - if epoch >= currentEpoch { - rp.log.Info(logs.ReputationIgnoreReputationValue, - zap.String("reason", "invalid epoch number"), - zap.Uint64("trust_epoch", epoch), - zap.Uint64("local_epoch", currentEpoch)) - - return - } - - // check signature - if !value.VerifySignature() { - rp.log.Info(logs.ReputationIgnoreReputationValue, - zap.String("reason", "invalid signature"), - ) - - return - } - - // check if manager is correct - if err := rp.checkManagers(epoch, value.Manager(), id); err != nil { - rp.log.Info(logs.ReputationIgnoreReputationValue, - zap.String("reason", "wrong manager"), - zap.String("error", err.Error())) - - return - } - - rp.approvePutReputation(e) -} - -func (rp *Processor) checkManagers(e uint64, mng apireputation.PeerID, peer apireputation.PeerID) error { - mm, err := rp.mngBuilder.BuildManagers(e, peer) - if err != nil { - return fmt.Errorf("could not build managers: %w", err) - } - - for _, m := range mm { - // FIXME: #1147 do not use `ToV2` method outside frostfs-api-go library - if bytes.Equal(mng.PublicKey(), m.PublicKey()) { - return nil - } - } - - return errWrongManager -} - -func (rp *Processor) approvePutReputation(e *reputationEvent.Put) { - var ( - id = e.PeerID() - err error - ) - - if nr := e.NotaryRequest(); nr != nil { - // put event was received via Notary service - err = rp.reputationWrp.Morph().NotarySignAndInvokeTX(nr.MainTransaction) - } else { - args := repClient.PutPrm{} - args.SetEpoch(e.Epoch()) - args.SetPeerID(id) - args.SetValue(e.Value()) - - err = rp.reputationWrp.Put(args) - } - if err != nil { - // FIXME: #1147 do not use `ToV2` method outside frostfs-api-go library - rp.log.Warn(logs.ReputationCantSendApprovalTxForReputationValue, - zap.String("peer_id", hex.EncodeToString(id.PublicKey())), - zap.String("error", err.Error())) - } -} diff --git a/pkg/innerring/processors/reputation/processor.go b/pkg/innerring/processors/reputation/processor.go deleted file mode 100644 index a248fa75f1..0000000000 --- a/pkg/innerring/processors/reputation/processor.go +++ /dev/null @@ -1,156 +0,0 @@ -package reputation - -import ( - "errors" - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - repClient "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event" - reputationEvent "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/event/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "github.com/nspcc-dev/neo-go/pkg/core/mempoolevent" - "github.com/panjf2000/ants/v2" - "go.uber.org/zap" -) - -type ( - // EpochState is a callback interface for inner ring global state. - EpochState interface { - EpochCounter() uint64 - } - - // AlphabetState is a callback interface for inner ring global state. - AlphabetState interface { - IsAlphabet() bool - } - - // Processor of events produced by reputation contract. - Processor struct { - log *logger.Logger - pool *ants.Pool - - epochState EpochState - alphabetState AlphabetState - - reputationWrp *repClient.Client - - mngBuilder common.ManagerBuilder - - notaryDisabled bool - } - - // Params of the processor constructor. - Params struct { - Log *logger.Logger - PoolSize int - EpochState EpochState - AlphabetState AlphabetState - ReputationWrapper *repClient.Client - ManagerBuilder common.ManagerBuilder - NotaryDisabled bool - } -) - -const ( - putReputationNotification = "reputationPut" -) - -// New creates reputation contract processor instance. -func New(p *Params) (*Processor, error) { - switch { - case p.Log == nil: - return nil, errors.New("ir/reputation: logger is not set") - case p.EpochState == nil: - return nil, errors.New("ir/reputation: global state is not set") - case p.AlphabetState == nil: - return nil, errors.New("ir/reputation: global state is not set") - case p.ReputationWrapper == nil: - return nil, errors.New("ir/reputation: reputation contract wrapper is not set") - case p.ManagerBuilder == nil: - return nil, errors.New("ir/reputation: manager builder is not set") - } - - p.Log.Debug(logs.ReputationReputationWorkerPool, zap.Int("size", p.PoolSize)) - - pool, err := ants.NewPool(p.PoolSize, ants.WithNonblocking(true)) - if err != nil { - return nil, fmt.Errorf("ir/reputation: can't create worker pool: %w", err) - } - - return &Processor{ - log: p.Log, - pool: pool, - epochState: p.EpochState, - alphabetState: p.AlphabetState, - reputationWrp: p.ReputationWrapper, - mngBuilder: p.ManagerBuilder, - notaryDisabled: p.NotaryDisabled, - }, nil -} - -// ListenerNotificationParsers for the 'event.Listener' event producer. -func (rp *Processor) ListenerNotificationParsers() []event.NotificationParserInfo { - if !rp.notaryDisabled { - return nil - } - - var parsers []event.NotificationParserInfo - - // put reputation event - put := event.NotificationParserInfo{} - put.SetType(putReputationNotification) - put.SetScriptHash(rp.reputationWrp.ContractAddress()) - put.SetParser(reputationEvent.ParsePut) - parsers = append(parsers, put) - - return parsers -} - -// ListenerNotificationHandlers for the 'event.Listener' event producer. -func (rp *Processor) ListenerNotificationHandlers() []event.NotificationHandlerInfo { - if !rp.notaryDisabled { - return nil - } - - var handlers []event.NotificationHandlerInfo - - // put reputation handler - put := event.NotificationHandlerInfo{} - put.SetType(putReputationNotification) - put.SetScriptHash(rp.reputationWrp.ContractAddress()) - put.SetHandler(rp.handlePutReputation) - handlers = append(handlers, put) - - return handlers -} - -// ListenerNotaryParsers for the 'event.Listener' notary event producer. -func (rp *Processor) ListenerNotaryParsers() []event.NotaryParserInfo { - var p event.NotaryParserInfo - - p.SetMempoolType(mempoolevent.TransactionAdded) - p.SetRequestType(reputationEvent.PutNotaryEvent) - p.SetScriptHash(rp.reputationWrp.ContractAddress()) - p.SetParser(reputationEvent.ParsePutNotary) - - return []event.NotaryParserInfo{p} -} - -// ListenerNotaryHandlers for the 'event.Listener' notary event producer. -func (rp *Processor) ListenerNotaryHandlers() []event.NotaryHandlerInfo { - var h event.NotaryHandlerInfo - - h.SetMempoolType(mempoolevent.TransactionAdded) - h.SetRequestType(reputationEvent.PutNotaryEvent) - h.SetScriptHash(rp.reputationWrp.ContractAddress()) - h.SetHandler(rp.handlePutReputation) - - return []event.NotaryHandlerInfo{h} -} - -// TimersHandlers for the 'Timers' event producer. -func (rp *Processor) TimersHandlers() []event.NotificationHandlerInfo { - return nil -} diff --git a/pkg/innerring/rpc.go b/pkg/innerring/rpc.go index 9a89c4fcb5..27338eaa4c 100644 --- a/pkg/innerring/rpc.go +++ b/pkg/innerring/rpc.go @@ -27,7 +27,7 @@ type ( ClientCache struct { log *logger.Logger cache interface { - Get(clientcore.NodeInfo) (clientcore.Client, error) + Get(clientcore.NodeInfo) (clientcore.MultiAddressClient, error) CloseAll() } key *ecdsa.PrivateKey diff --git a/pkg/network/cache/client.go b/pkg/network/cache/client.go index 549e98b65c..371d3c76f3 100644 --- a/pkg/network/cache/client.go +++ b/pkg/network/cache/client.go @@ -38,7 +38,7 @@ func NewSDKClientCache(opts ClientCacheOpts) *ClientCache { } // Get function returns existing client or creates a new one. -func (c *ClientCache) Get(info clientcore.NodeInfo) (clientcore.Client, error) { +func (c *ClientCache) Get(info clientcore.NodeInfo) (clientcore.MultiAddressClient, error) { netAddr := info.AddressGroup() if c.opts.AllowExternal { netAddr = append(netAddr, info.ExternalAddressGroup()...) diff --git a/pkg/network/transport/reputation/grpc/service.go b/pkg/network/transport/reputation/grpc/service.go deleted file mode 100644 index bb90743240..0000000000 --- a/pkg/network/transport/reputation/grpc/service.go +++ /dev/null @@ -1,50 +0,0 @@ -package grpcreputation - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation" - reputation2 "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation/grpc" - reputationrpc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/rpc" -) - -// Server wraps FrostFS API v2 Reputation service server -// and provides gRPC Reputation service server interface. -type Server struct { - srv reputationrpc.Server -} - -// New creates, initializes and returns Server instance. -func New(srv reputationrpc.Server) *Server { - return &Server{ - srv: srv, - } -} - -func (s *Server) AnnounceLocalTrust(ctx context.Context, r *reputation2.AnnounceLocalTrustRequest) (*reputation2.AnnounceLocalTrustResponse, error) { - req := new(reputation.AnnounceLocalTrustRequest) - if err := req.FromGRPCMessage(r); err != nil { - return nil, err - } - - resp, err := s.srv.AnnounceLocalTrust(ctx, req) - if err != nil { - return nil, err - } - - return resp.ToGRPCMessage().(*reputation2.AnnounceLocalTrustResponse), nil -} - -func (s *Server) AnnounceIntermediateResult(ctx context.Context, r *reputation2.AnnounceIntermediateResultRequest) (*reputation2.AnnounceIntermediateResultResponse, error) { - req := new(reputation.AnnounceIntermediateResultRequest) - if err := req.FromGRPCMessage(r); err != nil { - return nil, err - } - - resp, err := s.srv.AnnounceIntermediateResult(ctx, req) - if err != nil { - return nil, err - } - - return resp.ToGRPCMessage().(*reputation2.AnnounceIntermediateResultResponse), nil -} diff --git a/pkg/services/object/head/remote.go b/pkg/services/object/head/remote.go index 85f076a76d..bcba181f22 100644 --- a/pkg/services/object/head/remote.go +++ b/pkg/services/object/head/remote.go @@ -15,7 +15,7 @@ import ( ) type ClientConstructor interface { - Get(clientcore.NodeInfo) (clientcore.Client, error) + Get(clientcore.NodeInfo) (clientcore.MultiAddressClient, error) } // RemoteHeader represents utility for getting diff --git a/pkg/services/reputation/common/deps.go b/pkg/services/reputation/common/deps.go deleted file mode 100644 index 3ea5aa88e6..0000000000 --- a/pkg/services/reputation/common/deps.go +++ /dev/null @@ -1,78 +0,0 @@ -package common - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -type EpochProvider interface { - // Must return epoch number to select the values. - Epoch() uint64 -} - -// Writer describes the interface for storing reputation.Trust values. -// -// This interface is provided by both local storage -// of values and remote (wrappers over the RPC). -type Writer interface { - // Write performs a write operation of reputation.Trust value - // and returns any error encountered. - // - // All values after the Close call must be flushed to the - // physical target. Implementations can cache values before - // Close operation. - // - // Write must not be called after Close. - Write(context.Context, reputation.Trust) error - - // Close exits with method-providing Writer. - // - // All cached values must be flushed before - // the Close's return. - // - // Methods must not be called after Close. - Close(context.Context) error -} - -// WriterProvider is a group of methods provided -// by entity which generates keepers of -// reputation.Trust values. -type WriterProvider interface { - // InitWriter should return an initialized Writer. - // - // Initialization problems are reported via error. - // If no error was returned, then the Writer must not be nil. - // - // Implementations can have different logic for different - // contexts, so specific ones may document their own behavior. - InitWriter(EpochProvider) (Writer, error) -} - -// ManagerBuilder defines an interface for providing a list -// of Managers for specific epoch. Implementation depends on trust value. -type ManagerBuilder interface { - // BuildManagers must compose list of managers. It depends on - // particular epoch and PeerID of the current route point. - BuildManagers(epoch uint64, p apireputation.PeerID) ([]ServerInfo, error) -} - -// ServerInfo describes a set of -// characteristics of a point in a route. -type ServerInfo interface { - // PublicKey returns public key of the node - // from the route in a binary representation. - PublicKey() []byte - - // Iterates over network addresses of the node - // in the route. Breaks iterating on true return - // of the handler. - IterateAddresses(func(string) bool) - - // Returns number of server's network addresses. - NumberOfAddresses() int - - // ExternalAddresses returns external addresses of a node. - ExternalAddresses() []string -} diff --git a/pkg/services/reputation/common/managers.go b/pkg/services/reputation/common/managers.go deleted file mode 100644 index 84201809f3..0000000000 --- a/pkg/services/reputation/common/managers.go +++ /dev/null @@ -1,133 +0,0 @@ -package common - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - netmapcore "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/netmap" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - apiNetmap "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/netmap" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "git.frostfs.info/TrueCloudLab/hrw" - "go.uber.org/zap" -) - -// managerBuilder is implementation of reputation ManagerBuilder interface. -// It sorts nodes in NetMap with HRW algorithms and -// takes the next node after the current one as the only manager. -type managerBuilder struct { - log *logger.Logger - nmSrc netmapcore.Source - opts *mngOptions -} - -// ManagersPrm groups the required parameters of the managerBuilder's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type ManagersPrm struct { - NetMapSource netmapcore.Source -} - -// NewManagerBuilder creates a new instance of the managerBuilder. -// -// Panics if at least one value of the parameters is invalid. -// -// The created managerBuilder does not require additional -// initialization and is completely ready for work. -func NewManagerBuilder(prm ManagersPrm, opts ...MngOption) ManagerBuilder { - switch { - case prm.NetMapSource == nil: - panic(fmt.Sprintf("invalid NetMapSource (%T):%v", prm.NetMapSource, prm.NetMapSource)) - } - - o := defaultMngOpts() - - for i := range opts { - opts[i](o) - } - - return &managerBuilder{ - log: o.log, - nmSrc: prm.NetMapSource, - opts: o, - } -} - -// implements Server on apiNetmap.NodeInfo. -type nodeServer apiNetmap.NodeInfo - -func (x nodeServer) PublicKey() []byte { - return (apiNetmap.NodeInfo)(x).PublicKey() -} - -func (x nodeServer) IterateAddresses(f func(string) bool) { - (apiNetmap.NodeInfo)(x).IterateNetworkEndpoints(f) -} - -func (x nodeServer) NumberOfAddresses() int { - return (apiNetmap.NodeInfo)(x).NumberOfNetworkEndpoints() -} - -func (x nodeServer) ExternalAddresses() []string { - return (apiNetmap.NodeInfo)(x).ExternalAddresses() -} - -// BuildManagers sorts nodes in NetMap with HRW algorithms and -// takes the next node after the current one as the only manager. -func (mb *managerBuilder) BuildManagers(epoch uint64, p apireputation.PeerID) ([]ServerInfo, error) { - mb.log.Debug(logs.CommonStartBuildingManagers, - zap.Uint64("epoch", epoch), - zap.Stringer("peer", p), - ) - - nm, err := mb.nmSrc.GetNetMapByEpoch(epoch) - if err != nil { - return nil, err - } - - nmNodes := nm.Nodes() - - // make a copy to keep order consistency of the origin netmap after sorting - nodes := make([]apiNetmap.NodeInfo, len(nmNodes)) - - copy(nodes, nmNodes) - - hrw.SortHasherSliceByValue(nodes, epoch) - - for i := range nodes { - if apireputation.ComparePeerKey(p, nodes[i].PublicKey()) { - managerIndex := i + 1 - - if managerIndex == len(nodes) { - managerIndex = 0 - } - - return []ServerInfo{nodeServer(nodes[managerIndex])}, nil - } - } - - return nil, nil -} - -type mngOptions struct { - log *logger.Logger -} - -type MngOption func(*mngOptions) - -func defaultMngOpts() *mngOptions { - return &mngOptions{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -// WithLogger returns MngOption to specify logging component. -func WithLogger(l *logger.Logger) MngOption { - return func(o *mngOptions) { - if l != nil { - o.log = l - } - } -} diff --git a/pkg/services/reputation/common/router/calls.go b/pkg/services/reputation/common/router/calls.go deleted file mode 100644 index 4ed293beb1..0000000000 --- a/pkg/services/reputation/common/router/calls.go +++ /dev/null @@ -1,139 +0,0 @@ -package router - -import ( - "context" - "encoding/hex" - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "go.uber.org/zap" -) - -// RouteInfo wraps epoch provider with additional passed -// route data. It is only used inside Router and is -// not passed in any external methods. -type RouteInfo struct { - common.EpochProvider - - passedRoute []common.ServerInfo -} - -// NewRouteInfo wraps the main context of value passing with its traversal route and epoch. -func NewRouteInfo(ep common.EpochProvider, passed []common.ServerInfo) *RouteInfo { - return &RouteInfo{ - EpochProvider: ep, - passedRoute: passed, - } -} - -type trustWriter struct { - router *Router - - routeInfo *RouteInfo - - routeMtx sync.RWMutex - mServers map[string]common.Writer -} - -// InitWriter initializes and returns Writer that sends each value to its next route point. -// -// If ep was created by NewRouteInfo, then the traversed route is taken into account, -// and the value will be sent to its continuation. Otherwise, the route will be laid -// from scratch and the value will be sent to its primary point. -// -// After building a list of remote points of the next leg of the route, the value is sent -// sequentially to all of them. If any transmissions (even all) fail, an error will not -// be returned. -// -// Close of the composed Writer calls Close method on each internal Writer generated in -// runtime and never returns an error. -// -// Always returns nil error. -func (r *Router) InitWriter(ep common.EpochProvider) (common.Writer, error) { - var ( - routeInfo *RouteInfo - ok bool - ) - - if routeInfo, ok = ep.(*RouteInfo); !ok { - routeInfo = &RouteInfo{ - EpochProvider: ep, - passedRoute: []common.ServerInfo{r.localSrvInfo}, - } - } - - return &trustWriter{ - router: r, - routeInfo: routeInfo, - mServers: make(map[string]common.Writer), - }, nil -} - -func (w *trustWriter) Write(ctx context.Context, t reputation.Trust) error { - w.routeMtx.Lock() - defer w.routeMtx.Unlock() - - route, err := w.router.routeBuilder.NextStage(w.routeInfo.Epoch(), t, w.routeInfo.passedRoute) - if err != nil { - return err - } else if len(route) == 0 { - route = []common.ServerInfo{nil} - } - - for _, remoteInfo := range route { - var key string - - if remoteInfo != nil { - key = hex.EncodeToString(remoteInfo.PublicKey()) - } - - remoteWriter, ok := w.mServers[key] - if !ok { - provider, err := w.router.remoteProvider.InitRemote(remoteInfo) - if err != nil { - w.router.log.Debug(logs.RouterCouldNotInitializeWriterProvider, - zap.String("error", err.Error()), - ) - - continue - } - - // init writer with original context wrapped in routeContext - remoteWriter, err = provider.InitWriter(w.routeInfo.EpochProvider) - if err != nil { - w.router.log.Debug(logs.RouterCouldNotInitializeWriter, - zap.String("error", err.Error()), - ) - - continue - } - - w.mServers[key] = remoteWriter - } - - err := remoteWriter.Write(ctx, t) - if err != nil { - w.router.log.Debug(logs.RouterCouldNotWriteTheValue, - zap.String("error", err.Error()), - ) - } - } - - return nil -} - -func (w *trustWriter) Close(ctx context.Context) error { - for key, wRemote := range w.mServers { - err := wRemote.Close(ctx) - if err != nil { - w.router.log.Debug(logs.RouterCouldNotCloseRemoteServerWriter, - zap.String("key", key), - zap.String("error", err.Error()), - ) - } - } - - return nil -} diff --git a/pkg/services/reputation/common/router/deps.go b/pkg/services/reputation/common/router/deps.go deleted file mode 100644 index 36aecb59f0..0000000000 --- a/pkg/services/reputation/common/router/deps.go +++ /dev/null @@ -1,28 +0,0 @@ -package router - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" -) - -// Builder groups methods to route values in the network. -type Builder interface { - // NextStage must return next group of route points - // for passed epoch and trust values. - // Implementation must take into account already passed route points. - // - // Empty passed list means being at the starting point of the route. - // - // Must return empty list and no error if the endpoint of the route is reached. - NextStage(epoch uint64, t reputation.Trust, passed []common.ServerInfo) ([]common.ServerInfo, error) -} - -// RemoteWriterProvider describes the component -// for sending values to a fixed route point. -type RemoteWriterProvider interface { - // InitRemote must return WriterProvider to the route point - // corresponding to info. - // - // Nil info matches the end of the route. - InitRemote(info common.ServerInfo) (common.WriterProvider, error) -} diff --git a/pkg/services/reputation/common/router/opts.go b/pkg/services/reputation/common/router/opts.go deleted file mode 100644 index 1b34544122..0000000000 --- a/pkg/services/reputation/common/router/opts.go +++ /dev/null @@ -1,28 +0,0 @@ -package router - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// Option sets an optional parameter of Router. -type Option func(*options) - -type options struct { - log *logger.Logger -} - -func defaultOpts() *options { - return &options{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -// WithLogger returns Option to specify logging component. -func WithLogger(l *logger.Logger) Option { - return func(o *options) { - if l != nil { - o.log = l - } - } -} diff --git a/pkg/services/reputation/common/router/router.go b/pkg/services/reputation/common/router/router.go deleted file mode 100644 index b80f6ce52b..0000000000 --- a/pkg/services/reputation/common/router/router.go +++ /dev/null @@ -1,81 +0,0 @@ -package router - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" -) - -// Prm groups the required parameters of the Router's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Characteristics of the local node's server. - // - // Must not be nil. - LocalServerInfo common.ServerInfo - - // Component for sending values to a fixed route point. - // - // Must not be nil. - RemoteWriterProvider RemoteWriterProvider - - // Route planner. - // - // Must not be nil. - Builder Builder -} - -// Router represents component responsible for routing -// local trust values over the network. -// -// For each fixed pair (node peer, epoch) there is a -// single value route on the network. Router provides the -// interface for writing values to the next point of the route. -// -// For correct operation, Router must be created using -// the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the Router is immediately ready to work through API. -type Router struct { - log *logger.Logger - - remoteProvider RemoteWriterProvider - - routeBuilder Builder - - localSrvInfo common.ServerInfo -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -func New(prm Prm, opts ...Option) *Router { - switch { - case prm.RemoteWriterProvider == nil: - panicOnPrmValue("RemoteWriterProvider", prm.RemoteWriterProvider) - case prm.Builder == nil: - panicOnPrmValue("Builder", prm.Builder) - case prm.LocalServerInfo == nil: - panicOnPrmValue("LocalServerInfo", prm.LocalServerInfo) - } - - o := defaultOpts() - - for i := range opts { - opts[i](o) - } - - return &Router{ - log: o.log, - remoteProvider: prm.RemoteWriterProvider, - routeBuilder: prm.Builder, - localSrvInfo: prm.LocalServerInfo, - } -} diff --git a/pkg/services/reputation/common/router/util.go b/pkg/services/reputation/common/router/util.go deleted file mode 100644 index aa3190d2ba..0000000000 --- a/pkg/services/reputation/common/router/util.go +++ /dev/null @@ -1,40 +0,0 @@ -package router - -import ( - "bytes" - "errors" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" -) - -var errWrongRoute = errors.New("wrong route") - -// CheckRoute checks if the route is a route correctly constructed by the builder for value a. -// -// Returns nil if route is correct, otherwise an error clarifying the inconsistency. -func CheckRoute(builder Builder, epoch uint64, t reputation.Trust, route []common.ServerInfo) error { - for i := 1; i < len(route); i++ { - servers, err := builder.NextStage(epoch, t, route[:i]) - if err != nil { - return err - } else if len(servers) == 0 { - break - } - - found := false - - for j := range servers { - if bytes.Equal(servers[j].PublicKey(), route[i].PublicKey()) { - found = true - break - } - } - - if !found { - return errWrongRoute - } - } - - return nil -} diff --git a/pkg/services/reputation/eigentrust/calculator/calculator.go b/pkg/services/reputation/eigentrust/calculator/calculator.go deleted file mode 100644 index bfa274fea5..0000000000 --- a/pkg/services/reputation/eigentrust/calculator/calculator.go +++ /dev/null @@ -1,90 +0,0 @@ -package eigentrustcalc - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util" -) - -// Prm groups the required parameters of the Calculator's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Alpha parameter from origin EigenTrust algorithm - // http://ilpubs.stanford.edu:8090/562/1/2002-56.pdf Ch.5.1. - // - // Must be in range (0, 1). - AlphaProvider AlphaProvider - - // Source of initial node trust values - // - // Must not be nil. - InitialTrustSource InitialTrustSource - - DaughterTrustSource DaughterTrustIteratorProvider - - IntermediateValueTarget common.WriterProvider - - FinalResultTarget IntermediateWriterProvider - - WorkerPool util.WorkerPool -} - -// Calculator is a processor of a single iteration of EigenTrust algorithm. -// -// For correct operation, the Calculator must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the Calculator is immediately ready to work through -// API of external control of calculations and data transfer. -type Calculator struct { - alpha, beta reputation.TrustValue // beta = 1 - alpha - - prm Prm - - opts *options -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -// New creates a new instance of the Calculator. -// -// Panics if at least one value of the parameters is invalid. -// -// The created Calculator does not require additional -// initialization and is completely ready for work. -func New(prm Prm, opts ...Option) *Calculator { - switch { - case prm.AlphaProvider == nil: - panicOnPrmValue("AlphaProvider", prm.AlphaProvider) - case prm.InitialTrustSource == nil: - panicOnPrmValue("InitialTrustSource", prm.InitialTrustSource) - case prm.DaughterTrustSource == nil: - panicOnPrmValue("DaughterTrustSource", prm.DaughterTrustSource) - case prm.IntermediateValueTarget == nil: - panicOnPrmValue("IntermediateValueTarget", prm.IntermediateValueTarget) - case prm.FinalResultTarget == nil: - panicOnPrmValue("FinalResultTarget", prm.FinalResultTarget) - case prm.WorkerPool == nil: - panicOnPrmValue("WorkerPool", prm.WorkerPool) - } - - o := defaultOpts() - - for _, opt := range opts { - opt(o) - } - - return &Calculator{ - prm: prm, - opts: o, - } -} diff --git a/pkg/services/reputation/eigentrust/calculator/calls.go b/pkg/services/reputation/eigentrust/calculator/calls.go deleted file mode 100644 index 5e2e900aee..0000000000 --- a/pkg/services/reputation/eigentrust/calculator/calls.go +++ /dev/null @@ -1,295 +0,0 @@ -package eigentrustcalc - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" - "go.uber.org/zap" -) - -type CalculatePrm struct { - last bool - - ei eigentrust.EpochIteration -} - -func (p *CalculatePrm) SetLast(last bool) { - p.last = last -} - -func (p *CalculatePrm) SetEpochIteration(ei eigentrust.EpochIteration) { - p.ei = ei -} - -func (c *Calculator) Calculate(ctx context.Context, prm CalculatePrm) { - alpha, err := c.prm.AlphaProvider.EigenTrustAlpha() - if err != nil { - c.opts.log.Debug( - logs.CalculatorFailedToGetAlphaParam, - zap.Error(err), - ) - return - } - - c.alpha = reputation.TrustValueFromFloat64(alpha) - c.beta = reputation.TrustValueFromFloat64(1 - alpha) - - epochIteration := prm.ei - - iter := epochIteration.I() - - log := c.opts.log.With( - zap.Uint64("epoch", epochIteration.Epoch()), - zap.Uint32("iteration", iter), - ) - - if iter == 0 { - c.sendInitialValues(ctx, epochIteration) - return - } - - // decrement iteration number to select the values collected - // on the previous stage - epochIteration.SetI(iter - 1) - - consumersIter, err := c.prm.DaughterTrustSource.InitConsumersIterator(epochIteration) - if err != nil { - log.Debug(logs.CalculatorConsumersTrustIteratorsInitFailure, - zap.String("error", err.Error()), - ) - - return - } - - // continue with initial iteration number - epochIteration.SetI(iter) - - err = consumersIter.Iterate(func(daughter apireputation.PeerID, iter TrustIterator) error { - err := c.prm.WorkerPool.Submit(func() { - c.iterateDaughter(ctx, iterDaughterPrm{ - lastIter: prm.last, - ei: epochIteration, - id: daughter, - consumersIter: iter, - }) - }) - if err != nil { - log.Debug(logs.CalculatorWorkerPoolSubmitFailure, - zap.String("error", err.Error()), - ) - } - - // don't stop trying - return nil - }) - if err != nil { - log.Debug(logs.CalculatorIterateDaughtersConsumersFailed, - zap.String("error", err.Error()), - ) - } -} - -type iterDaughterPrm struct { - lastIter bool - - ei EpochIterationInfo - - id apireputation.PeerID - - consumersIter TrustIterator -} - -func (c *Calculator) iterateDaughter(ctx context.Context, p iterDaughterPrm) { - initTrust, err := c.prm.InitialTrustSource.InitialTrust(p.id) - if err != nil { - c.opts.log.Debug(logs.CalculatorGetInitialTrustFailure, - zap.Stringer("daughter", p.id), - zap.String("error", err.Error()), - ) - - return - } - - daughterIter, err := c.prm.DaughterTrustSource.InitDaughterIterator(p.ei, p.id) - if err != nil { - c.opts.log.Debug(logs.CalculatorDaughterTrustIteratorsInitFailure, - zap.String("error", err.Error()), - ) - - return - } - - sum := reputation.TrustZero - - err = p.consumersIter.Iterate(func(trust reputation.Trust) error { - if !p.lastIter { - select { - case <-ctx.Done(): - return ctx.Err() - default: - } - } - - sum.Add(trust.Value()) - return nil - }) - if err != nil { - c.opts.log.Debug(logs.CalculatorIterateOverDaughtersTrustsFailure, - zap.String("error", err.Error()), - ) - - return - } - - // Alpha * Pd - initTrust.Mul(c.alpha) - - sum.Mul(c.beta) - sum.Add(initTrust) - - var intermediateTrust eigentrust.IterationTrust - - intermediateTrust.SetEpoch(p.ei.Epoch()) - intermediateTrust.SetPeer(p.id) - intermediateTrust.SetI(p.ei.I()) - - if p.lastIter { - c.processLastIteration(p, intermediateTrust, sum) - } else { - c.processIntermediateIteration(ctx, p, daughterIter, sum) - } -} - -func (c *Calculator) processLastIteration(p iterDaughterPrm, intermediateTrust eigentrust.IterationTrust, sum reputation.TrustValue) { - finalWriter, err := c.prm.FinalResultTarget.InitIntermediateWriter(p.ei) - if err != nil { - c.opts.log.Debug(logs.CalculatorInitWriterFailure, - zap.String("error", err.Error()), - ) - - return - } - - intermediateTrust.SetValue(sum) - - err = finalWriter.WriteIntermediateTrust(intermediateTrust) - if err != nil { - c.opts.log.Debug(logs.CalculatorWriteFinalResultFailure, - zap.String("error", err.Error()), - ) - - return - } -} - -func (c *Calculator) processIntermediateIteration(ctx context.Context, p iterDaughterPrm, daughterIter TrustIterator, sum reputation.TrustValue) { - intermediateWriter, err := c.prm.IntermediateValueTarget.InitWriter(p.ei) - if err != nil { - c.opts.log.Debug(logs.CalculatorInitWriterFailure, - zap.String("error", err.Error()), - ) - - return - } - - err = daughterIter.Iterate(func(trust reputation.Trust) error { - select { - case <-ctx.Done(): - return ctx.Err() - default: - } - - val := trust.Value() - val.Mul(sum) - - trust.SetValue(val) - - err := intermediateWriter.Write(ctx, trust) - if err != nil { - c.opts.log.Debug(logs.CalculatorWriteValueFailure, - zap.String("error", err.Error()), - ) - } - - return nil - }) - if err != nil { - c.opts.log.Debug(logs.CalculatorIterateDaughterTrustsFailure, - zap.String("error", err.Error()), - ) - } - - err = intermediateWriter.Close(ctx) - if err != nil { - c.opts.log.Error( - "could not close writer", - zap.String("error", err.Error()), - ) - } -} - -func (c *Calculator) sendInitialValues(ctx context.Context, epochInfo EpochIterationInfo) { - daughterIter, err := c.prm.DaughterTrustSource.InitAllDaughtersIterator(epochInfo) - if err != nil { - c.opts.log.Debug(logs.CalculatorAllDaughtersTrustIteratorsInitFailure, - zap.String("error", err.Error()), - ) - - return - } - - intermediateWriter, err := c.prm.IntermediateValueTarget.InitWriter(epochInfo) - if err != nil { - c.opts.log.Debug(logs.CalculatorInitWriterFailure, - zap.String("error", err.Error()), - ) - - return - } - - err = daughterIter.Iterate(func(daughter apireputation.PeerID, iterator TrustIterator) error { - return iterator.Iterate(func(trust reputation.Trust) error { - trusted := trust.Peer() - - initTrust, err := c.prm.InitialTrustSource.InitialTrust(trusted) - if err != nil { - c.opts.log.Debug(logs.CalculatorGetInitialTrustFailure, - zap.Stringer("peer", trusted), - zap.String("error", err.Error()), - ) - - // don't stop on single failure - return nil - } - - initTrust.Mul(trust.Value()) - trust.SetValue(initTrust) - - err = intermediateWriter.Write(ctx, trust) - if err != nil { - c.opts.log.Debug(logs.CalculatorWriteValueFailure, - zap.String("error", err.Error()), - ) - - // don't stop on single failure - } - - return nil - }) - }) - if err != nil { - c.opts.log.Debug(logs.CalculatorIterateOverAllDaughtersFailure, - zap.String("error", err.Error()), - ) - } - - err = intermediateWriter.Close(ctx) - if err != nil { - c.opts.log.Debug(logs.CalculatorCouldNotCloseWriter, - zap.String("error", err.Error()), - ) - } -} diff --git a/pkg/services/reputation/eigentrust/calculator/deps.go b/pkg/services/reputation/eigentrust/calculator/deps.go deleted file mode 100644 index a22d1df76d..0000000000 --- a/pkg/services/reputation/eigentrust/calculator/deps.go +++ /dev/null @@ -1,74 +0,0 @@ -package eigentrustcalc - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -type EpochIterationInfo interface { - // Must return epoch number to select the values - // for global trust calculation. - Epoch() uint64 - - // Must return the sequence number of the iteration. - I() uint32 -} - -// InitialTrustSource must provide initial(non-calculated) -// trusts to current node's daughter. Realization may depends -// on daughter. -type InitialTrustSource interface { - InitialTrust(apireputation.PeerID) (reputation.TrustValue, error) -} - -// TrustIterator must iterate over all retrieved(or calculated) trusts -// and call passed TrustHandler on them. -type TrustIterator interface { - Iterate(reputation.TrustHandler) error -} - -type PeerTrustsHandler func(apireputation.PeerID, TrustIterator) error - -// PeerTrustsIterator must iterate over all nodes(PeerIDs) and provide -// TrustIterator for iteration over node's Trusts to others peers. -type PeerTrustsIterator interface { - Iterate(PeerTrustsHandler) error -} - -type DaughterTrustIteratorProvider interface { - // InitDaughterIterator must init TrustIterator - // that iterates over received local trusts from - // daughter p for epochInfo.Epoch() epoch. - InitDaughterIterator(epochInfo EpochIterationInfo, p apireputation.PeerID) (TrustIterator, error) - // InitAllDaughtersIterator must init PeerTrustsIterator - // that must iterate over all daughters of the current - // node(manager) and all trusts received from them for - // epochInfo.Epoch() epoch. - InitAllDaughtersIterator(epochInfo EpochIterationInfo) (PeerTrustsIterator, error) - // InitConsumersIterator must init PeerTrustsIterator - // that must iterate over all daughters of the current - // node(manager) and their consumers' trusts received - // from other managers for epochInfo.Epoch() epoch and - // epochInfo.I() iteration. - InitConsumersIterator(EpochIterationInfo) (PeerTrustsIterator, error) -} - -// IntermediateWriter must write intermediate result to contract. -// It may depends on realization either trust is sent directly to contract -// or via redirecting to other node. -type IntermediateWriter interface { - WriteIntermediateTrust(eigentrust.IterationTrust) error -} - -// IntermediateWriterProvider must provide ready-to-work -// IntermediateWriter. -type IntermediateWriterProvider interface { - InitIntermediateWriter(EpochIterationInfo) (IntermediateWriter, error) -} - -// AlphaProvider must provide information about required -// alpha parameter for eigen trust algorithm. -type AlphaProvider interface { - EigenTrustAlpha() (float64, error) -} diff --git a/pkg/services/reputation/eigentrust/calculator/opts.go b/pkg/services/reputation/eigentrust/calculator/opts.go deleted file mode 100644 index e1e5723611..0000000000 --- a/pkg/services/reputation/eigentrust/calculator/opts.go +++ /dev/null @@ -1,30 +0,0 @@ -package eigentrustcalc - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// Option sets an optional parameter of Controller. -type Option func(*options) - -type options struct { - log *logger.Logger -} - -func defaultOpts() *options { - return &options{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -// WithLogger returns option to specify logging component. -// -// Ignores nil values. -func WithLogger(l *logger.Logger) Option { - return func(o *options) { - if l != nil { - o.log = l - } - } -} diff --git a/pkg/services/reputation/eigentrust/controller/calls.go b/pkg/services/reputation/eigentrust/controller/calls.go deleted file mode 100644 index 886daf9be4..0000000000 --- a/pkg/services/reputation/eigentrust/controller/calls.go +++ /dev/null @@ -1,73 +0,0 @@ -package eigentrustctrl - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - "go.uber.org/zap" -) - -// ContinuePrm groups the required parameters of Continue operation. -type ContinuePrm struct { - Epoch uint64 -} - -type iterContext struct { - eigentrust.EpochIteration - - iterationNumber uint32 - last bool -} - -func (x iterContext) Last() bool { - return x.last -} - -// Continue moves the global reputation calculator to the next iteration. -func (c *Controller) Continue(ctx context.Context, prm ContinuePrm) { - c.mtx.Lock() - - { - iterCtx, ok := c.mCtx[prm.Epoch] - if !ok { - iterCtx = new(iterContext) - c.mCtx[prm.Epoch] = iterCtx - - iterCtx.EpochIteration.SetEpoch(prm.Epoch) - - iterations, err := c.prm.IterationsProvider.EigenTrustIterations() - if err != nil { - c.opts.log.Error(logs.ControllerCouldNotGetEigenTrustIterationNumber, - zap.Error(err), - ) - } else { - iterCtx.iterationNumber = uint32(iterations) - } - } - - iterCtx.last = iterCtx.I() == iterCtx.iterationNumber-1 - - err := c.prm.WorkerPool.Submit(func() { - c.prm.DaughtersTrustCalculator.Calculate(ctx, iterCtx) - - // iteration++ - iterCtx.Increment() - }) - if err != nil { - c.opts.log.Debug(logs.ControllerIterationSubmitFailure, - zap.String("error", err.Error()), - ) - } - - if iterCtx.last { - // will only live while the application is alive. - // during normal operation of the system. Also, such information - // number as already processed, but in any case it grows up - // In this case and worker pool failure we can mark epoch - delete(c.mCtx, prm.Epoch) - } - } - - c.mtx.Unlock() -} diff --git a/pkg/services/reputation/eigentrust/controller/controller.go b/pkg/services/reputation/eigentrust/controller/controller.go deleted file mode 100644 index a6d0d4a82d..0000000000 --- a/pkg/services/reputation/eigentrust/controller/controller.go +++ /dev/null @@ -1,86 +0,0 @@ -package eigentrustctrl - -import ( - "fmt" - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util" -) - -// Prm groups the required parameters of the Controller's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Component of computing iteration of EigenTrust algorithm. - // - // Must not be nil. - DaughtersTrustCalculator DaughtersTrustCalculator - - // IterationsProvider provides information about numbers - // of iterations for algorithm. - IterationsProvider IterationsProvider - - // Routine execution pool for single epoch iteration. - WorkerPool util.WorkerPool -} - -// Controller represents EigenTrust algorithm transient controller. -// -// Controller's main goal is to separate the two main stages of -// the calculation: -// 1. reporting local values to manager nodes -// 2. calculating global trusts of child nodes -// -// Calculation stages are controlled based on external signals -// that come from the application through the Controller's API. -// -// For correct operation, the controller must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the constructor is immediately ready to work through -// API of external control of calculations and data transfer. -type Controller struct { - prm Prm - - opts *options - - mtx sync.Mutex - mCtx map[uint64]*iterContext -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -// New creates a new instance of the Controller. -// -// Panics if at least one value of the parameters is invalid. -// -// The created Controller does not require additional -// initialization and is completely ready for work. -func New(prm Prm, opts ...Option) *Controller { - switch { - case prm.IterationsProvider == nil: - panicOnPrmValue("IterationNumber", prm.IterationsProvider) - case prm.WorkerPool == nil: - panicOnPrmValue("WorkerPool", prm.WorkerPool) - case prm.DaughtersTrustCalculator == nil: - panicOnPrmValue("DaughtersTrustCalculator", prm.DaughtersTrustCalculator) - } - - o := defaultOpts() - - for _, opt := range opts { - opt(o) - } - - return &Controller{ - prm: prm, - opts: o, - mCtx: make(map[uint64]*iterContext), - } -} diff --git a/pkg/services/reputation/eigentrust/controller/deps.go b/pkg/services/reputation/eigentrust/controller/deps.go deleted file mode 100644 index c068f7cc43..0000000000 --- a/pkg/services/reputation/eigentrust/controller/deps.go +++ /dev/null @@ -1,37 +0,0 @@ -package eigentrustctrl - -import "context" - -// IterationContext is a context of the i-th -// stage of iterative EigenTrust algorithm. -type IterationContext interface { - // Must return epoch number to select the values - // for global trust calculation. - Epoch() uint64 - - // Must return the sequence number of the iteration. - I() uint32 - - // Must return true if I() is the last iteration. - Last() bool -} - -// DaughtersTrustCalculator is an interface of entity -// responsible for calculating the global trust of -// daughter nodes in terms of EigenTrust algorithm. -type DaughtersTrustCalculator interface { - // Must perform the iteration step of the loop - // for computing the global trust of all daughter - // nodes and sending intermediate values - // according to EigenTrust description - // http://ilpubs.stanford.edu:8090/562/1/2002-56.pdf Ch.5.1. - // - // Execution should be interrupted if ctx.Last(). - Calculate(ctx context.Context, iter IterationContext) -} - -// IterationsProvider must provide information about numbers -// of iterations for algorithm. -type IterationsProvider interface { - EigenTrustIterations() (uint64, error) -} diff --git a/pkg/services/reputation/eigentrust/controller/opts.go b/pkg/services/reputation/eigentrust/controller/opts.go deleted file mode 100644 index 16bc61c2f1..0000000000 --- a/pkg/services/reputation/eigentrust/controller/opts.go +++ /dev/null @@ -1,30 +0,0 @@ -package eigentrustctrl - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// Option sets an optional parameter of Controller. -type Option func(*options) - -type options struct { - log *logger.Logger -} - -func defaultOpts() *options { - return &options{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -// WithLogger returns option to specify logging component. -// -// Ignores nil values. -func WithLogger(l *logger.Logger) Option { - return func(o *options) { - if l != nil { - o.log = l - } - } -} diff --git a/pkg/services/reputation/eigentrust/iteration.go b/pkg/services/reputation/eigentrust/iteration.go deleted file mode 100644 index e4793f0441..0000000000 --- a/pkg/services/reputation/eigentrust/iteration.go +++ /dev/null @@ -1,44 +0,0 @@ -package eigentrust - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" -) - -type EpochIteration struct { - e uint64 - i uint32 -} - -func (x EpochIteration) Epoch() uint64 { - return x.e -} - -func (x *EpochIteration) SetEpoch(e uint64) { - x.e = e -} - -func (x EpochIteration) I() uint32 { - return x.i -} - -func (x *EpochIteration) SetI(i uint32) { - x.i = i -} - -func (x *EpochIteration) Increment() { - x.i++ -} - -type IterationTrust struct { - EpochIteration - reputation.Trust -} - -func NewEpochIteration(epoch uint64, iter uint32) *EpochIteration { - ei := EpochIteration{} - - ei.SetI(iter) - ei.SetEpoch(epoch) - - return &ei -} diff --git a/pkg/services/reputation/eigentrust/routes/builder.go b/pkg/services/reputation/eigentrust/routes/builder.go deleted file mode 100644 index ddd5a2ae0d..0000000000 --- a/pkg/services/reputation/eigentrust/routes/builder.go +++ /dev/null @@ -1,59 +0,0 @@ -package routes - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" -) - -// Prm groups the required parameters of the Builder's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Manager builder for current node. - // - // Must not be nil. - ManagerBuilder common.ManagerBuilder - - Log *logger.Logger -} - -// Builder represents component that routes node to its managers. -// -// For correct operation, Builder must be created using -// the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the Builder is immediately ready to work through API. -type Builder struct { - managerBuilder common.ManagerBuilder - log *logger.Logger -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -// New creates a new instance of the Builder. -// -// Panics if at least one value of the parameters is invalid. -// -// The created Builder does not require additional -// initialization and is completely ready for work. -func New(prm Prm) *Builder { - switch { - case prm.ManagerBuilder == nil: - panicOnPrmValue("ManagerBuilder", prm.ManagerBuilder) - case prm.Log == nil: - panicOnPrmValue("Logger", prm.Log) - } - - return &Builder{ - managerBuilder: prm.ManagerBuilder, - log: prm.Log, - } -} diff --git a/pkg/services/reputation/eigentrust/routes/calls.go b/pkg/services/reputation/eigentrust/routes/calls.go deleted file mode 100644 index ccb2fe8ea1..0000000000 --- a/pkg/services/reputation/eigentrust/routes/calls.go +++ /dev/null @@ -1,33 +0,0 @@ -package routes - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "go.uber.org/zap" -) - -// NextStage builds Manager list for trusted node and returns it directly. -// -// If passed route has more than one point, then endpoint of the route is reached. -func (b *Builder) NextStage(epoch uint64, t reputation.Trust, passed []common.ServerInfo) ([]common.ServerInfo, error) { - passedLen := len(passed) - - b.log.Debug(logs.RoutesBuildingNextStageForTrustRoute, - zap.Uint64("epoch", epoch), - zap.Int("passed_length", passedLen), - ) - - if passedLen > 1 { - return nil, nil - } - - route, err := b.managerBuilder.BuildManagers(epoch, t.Peer()) - if err != nil { - return nil, fmt.Errorf("could not build managers for epoch: %d: %w", epoch, err) - } - - return route, nil -} diff --git a/pkg/services/reputation/eigentrust/storage/consumers/calls.go b/pkg/services/reputation/eigentrust/storage/consumers/calls.go deleted file mode 100644 index 55a4d6f3d7..0000000000 --- a/pkg/services/reputation/eigentrust/storage/consumers/calls.go +++ /dev/null @@ -1,201 +0,0 @@ -package consumerstorage - -import ( - "fmt" - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust" - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// Put saves intermediate trust of the consumer to daughter peer. -func (x *Storage) Put(trust eigentrust.IterationTrust) { - var s *iterationConsumersStorage - - x.mtx.Lock() - - { - epoch := trust.Epoch() - - s = x.mItems[epoch] - if s == nil { - s = &iterationConsumersStorage{ - mItems: make(map[uint32]*ConsumersStorage, 1), - } - - x.mItems[epoch] = s - } - } - - x.mtx.Unlock() - - s.put(trust) -} - -// Consumers returns the storage of trusts of the consumers of the daughter peers -// for particular iteration of EigenTrust calculation for particular epoch. -// -// Returns false if there is no data for the epoch and iter. -func (x *Storage) Consumers(epoch uint64, iter uint32) (*ConsumersStorage, bool) { - var ( - s *iterationConsumersStorage - ok bool - ) - - x.mtx.Lock() - - { - s, ok = x.mItems[epoch] - } - - x.mtx.Unlock() - - if !ok { - return nil, false - } - - return s.consumers(iter) -} - -// maps iteration numbers of EigenTrust algorithm to repositories -// of the trusts of the consumers of the daughter peers. -type iterationConsumersStorage struct { - mtx sync.RWMutex - - mItems map[uint32]*ConsumersStorage -} - -func (x *iterationConsumersStorage) put(trust eigentrust.IterationTrust) { - var s *ConsumersStorage - - x.mtx.Lock() - - { - iter := trust.I() - - s = x.mItems[iter] - if s == nil { - s = &ConsumersStorage{ - mItems: make(map[string]*ConsumersTrusts, 1), - } - - x.mItems[iter] = s - } - } - - x.mtx.Unlock() - - s.put(trust) -} - -func (x *iterationConsumersStorage) consumers(iter uint32) (s *ConsumersStorage, ok bool) { - x.mtx.Lock() - - { - s, ok = x.mItems[iter] - } - - x.mtx.Unlock() - - return -} - -// ConsumersStorage represents in-memory storage of intermediate trusts -// of the peer consumers. -// -// Maps daughter peers to repositories of the trusts of their consumers. -type ConsumersStorage struct { - mtx sync.RWMutex - - mItems map[string]*ConsumersTrusts -} - -func (x *ConsumersStorage) put(trust eigentrust.IterationTrust) { - var s *ConsumersTrusts - - x.mtx.Lock() - - { - daughter := trust.Peer().EncodeToString() - - s = x.mItems[daughter] - if s == nil { - s = &ConsumersTrusts{ - mItems: make(map[string]reputation.Trust, 1), - } - - x.mItems[daughter] = s - } - } - - x.mtx.Unlock() - - s.put(trust) -} - -// Iterate passes IDs of the daughter peers with the trusts of their consumers to h. -// -// Returns errors from h directly. -func (x *ConsumersStorage) Iterate(h eigentrustcalc.PeerTrustsHandler) (err error) { - x.mtx.RLock() - - { - for strTrusted, trusts := range x.mItems { - var trusted apireputation.PeerID - - if strTrusted != "" { - err = trusted.DecodeString(strTrusted) - if err != nil { - panic(fmt.Sprintf("decode peer ID string %s: %v", strTrusted, err)) - } - } - - if err = h(trusted, trusts); err != nil { - break - } - } - } - - x.mtx.RUnlock() - - return -} - -// ConsumersTrusts represents in-memory storage of the trusts -// of the consumer peers to some other peer. -type ConsumersTrusts struct { - mtx sync.RWMutex - - mItems map[string]reputation.Trust -} - -func (x *ConsumersTrusts) put(trust eigentrust.IterationTrust) { - x.mtx.Lock() - - { - x.mItems[trust.TrustingPeer().EncodeToString()] = trust.Trust - } - - x.mtx.Unlock() -} - -// Iterate passes all stored trusts to h. -// -// Returns errors from h directly. -func (x *ConsumersTrusts) Iterate(h reputation.TrustHandler) (err error) { - x.mtx.RLock() - - { - for _, trust := range x.mItems { - if err = h(trust); err != nil { - break - } - } - } - - x.mtx.RUnlock() - - return -} diff --git a/pkg/services/reputation/eigentrust/storage/consumers/storage.go b/pkg/services/reputation/eigentrust/storage/consumers/storage.go deleted file mode 100644 index ee811d84b2..0000000000 --- a/pkg/services/reputation/eigentrust/storage/consumers/storage.go +++ /dev/null @@ -1,40 +0,0 @@ -package consumerstorage - -import ( - "sync" -) - -// Prm groups the required parameters of the Storage's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -// -// The component is not parameterizable at the moment. -type Prm struct{} - -// Storage represents in-memory storage of the trusts -// of the consumer peers. -// -// It maps epoch numbers to the repositories of intermediate -// trusts of the consumers of the daughter peers. -// -// For correct operation, Storage must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// Storage is immediately ready to work through API. -type Storage struct { - mtx sync.RWMutex - - mItems map[uint64]*iterationConsumersStorage -} - -// New creates a new instance of the Storage. -// -// The created Storage does not require additional -// initialization and is completely ready for work. -func New(_ Prm) *Storage { - return &Storage{ - mItems: make(map[uint64]*iterationConsumersStorage), - } -} diff --git a/pkg/services/reputation/eigentrust/storage/daughters/calls.go b/pkg/services/reputation/eigentrust/storage/daughters/calls.go deleted file mode 100644 index eb229365e7..0000000000 --- a/pkg/services/reputation/eigentrust/storage/daughters/calls.go +++ /dev/null @@ -1,177 +0,0 @@ -package daughters - -import ( - "fmt" - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - eigentrustcalc "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/eigentrust/calculator" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// Put saves daughter peer's trust to its provider for the epoch. -func (x *Storage) Put(epoch uint64, trust reputation.Trust) { - var s *DaughterStorage - - x.mtx.Lock() - - { - s = x.mItems[epoch] - if s == nil { - s = &DaughterStorage{ - mItems: make(map[string]*DaughterTrusts, 1), - } - - x.mItems[epoch] = s - } - } - - x.mtx.Unlock() - - s.put(trust) -} - -// DaughterTrusts returns daughter trusts for the epoch. -// -// Returns false if there is no data for the epoch and daughter. -func (x *Storage) DaughterTrusts(epoch uint64, daughter apireputation.PeerID) (*DaughterTrusts, bool) { - var ( - s *DaughterStorage - ok bool - ) - - x.mtx.RLock() - - { - s, ok = x.mItems[epoch] - } - - x.mtx.RUnlock() - - if !ok { - return nil, false - } - - return s.daughterTrusts(daughter) -} - -// AllDaughterTrusts returns daughter iterator for the epoch. -// -// Returns false if there is no data for the epoch and daughter. -func (x *Storage) AllDaughterTrusts(epoch uint64) (*DaughterStorage, bool) { - x.mtx.RLock() - defer x.mtx.RUnlock() - - s, ok := x.mItems[epoch] - - return s, ok -} - -// DaughterStorage maps IDs of daughter peers to repositories of the local trusts to their providers. -type DaughterStorage struct { - mtx sync.RWMutex - - mItems map[string]*DaughterTrusts -} - -// Iterate passes IDs of the daughter peers with their trusts to h. -// -// Returns errors from h directly. -func (x *DaughterStorage) Iterate(h eigentrustcalc.PeerTrustsHandler) (err error) { - x.mtx.RLock() - - { - for strDaughter, daughterTrusts := range x.mItems { - var daughter apireputation.PeerID - - if strDaughter != "" { - err = daughter.DecodeString(strDaughter) - if err != nil { - panic(fmt.Sprintf("decode peer ID string %s: %v", strDaughter, err)) - } - } - - if err = h(daughter, daughterTrusts); err != nil { - break - } - } - } - - x.mtx.RUnlock() - - return -} - -func (x *DaughterStorage) put(trust reputation.Trust) { - var dt *DaughterTrusts - - x.mtx.Lock() - - { - trusting := trust.TrustingPeer().EncodeToString() - - dt = x.mItems[trusting] - if dt == nil { - dt = &DaughterTrusts{ - mItems: make(map[string]reputation.Trust, 1), - } - - x.mItems[trusting] = dt - } - } - - x.mtx.Unlock() - - dt.put(trust) -} - -func (x *DaughterStorage) daughterTrusts(id apireputation.PeerID) (dt *DaughterTrusts, ok bool) { - x.mtx.RLock() - - { - dt, ok = x.mItems[id.EncodeToString()] - } - - x.mtx.RUnlock() - - return -} - -// DaughterTrusts represents in-memory storage of local trusts -// of the daughter peer to its providers. -// -// Maps IDs of daughter's providers to the local trusts to them. -type DaughterTrusts struct { - mtx sync.RWMutex - - mItems map[string]reputation.Trust -} - -func (x *DaughterTrusts) put(trust reputation.Trust) { - x.mtx.Lock() - - { - x.mItems[trust.Peer().EncodeToString()] = trust - } - - x.mtx.Unlock() -} - -// Iterate passes all stored trusts to h. -// -// Returns errors from h directly. -func (x *DaughterTrusts) Iterate(h reputation.TrustHandler) (err error) { - x.mtx.RLock() - - { - for _, trust := range x.mItems { - if err = h(trust); err != nil { - break - } - } - } - - x.mtx.RUnlock() - - return -} diff --git a/pkg/services/reputation/eigentrust/storage/daughters/storage.go b/pkg/services/reputation/eigentrust/storage/daughters/storage.go deleted file mode 100644 index 26399fce44..0000000000 --- a/pkg/services/reputation/eigentrust/storage/daughters/storage.go +++ /dev/null @@ -1,38 +0,0 @@ -package daughters - -import "sync" - -// Prm groups the required parameters of the Storage's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -// -// The component is not parameterizable at the moment. -type Prm struct{} - -// Storage represents in-memory storage of local trust -// values of the daughter peers. -// -// It maps epoch numbers to the repositories of local trusts -// of the daughter peers. -// -// For correct operation, Storage must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// Storage is immediately ready to work through API. -type Storage struct { - mtx sync.RWMutex - - mItems map[uint64]*DaughterStorage -} - -// New creates a new instance of the Storage. -// -// The created Storage does not require additional -// initialization and is completely ready for work. -func New(_ Prm) *Storage { - return &Storage{ - mItems: make(map[uint64]*DaughterStorage), - } -} diff --git a/pkg/services/reputation/local/controller/calls.go b/pkg/services/reputation/local/controller/calls.go deleted file mode 100644 index 1cad09313e..0000000000 --- a/pkg/services/reputation/local/controller/calls.go +++ /dev/null @@ -1,193 +0,0 @@ -package trustcontroller - -import ( - "context" - "errors" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// ReportPrm groups the required parameters of the Controller.Report method. -type ReportPrm struct { - epoch uint64 -} - -// SetEpoch sets epoch number to select reputation values. -func (p *ReportPrm) SetEpoch(e uint64) { - p.epoch = e -} - -// Report reports local reputation values. -// -// Single Report operation overtakes all data from LocalTrustSource -// to LocalTrustTarget (Controller's parameters). -// -// Each call acquires a report context for an Epoch parameter. -// At the very end of the operation, the context is released. -func (c *Controller) Report(ctx context.Context, prm ReportPrm) { - // acquire report - rCtx, reporter := c.acquireReporter(ctx, prm.epoch) - if reporter == nil { - return - } - - // report local trust values - reporter.report(rCtx) - - // finally stop and free the report - c.freeReport(prm.epoch, reporter.log) -} - -type reporter struct { - epoch uint64 - - ctrl *Controller - - log *logger.Logger - - ep common.EpochProvider -} - -type epochProvider struct { - epoch uint64 -} - -func (c epochProvider) Epoch() uint64 { - return c.epoch -} - -func (c *Controller) acquireReporter(ctx context.Context, epoch uint64) (context.Context, *reporter) { - started := true - - c.mtx.Lock() - { - if cancel := c.mCtx[epoch]; cancel == nil { - ctx, cancel = context.WithCancel(ctx) - c.mCtx[epoch] = cancel - started = false - } - } - c.mtx.Unlock() - - log := &logger.Logger{Logger: c.opts.log.With( - zap.Uint64("epoch", epoch), - )} - - if started { - log.Debug(logs.ControllerReportIsAlreadyStarted) - return ctx, nil - } - - return ctx, &reporter{ - epoch: epoch, - ctrl: c, - log: log, - ep: &epochProvider{ - epoch: epoch, - }, - } -} - -func (c *reporter) report(ctx context.Context) { - c.log.Debug(logs.ControllerStartingToReportLocalTrustValues) - - // initialize iterator over locally collected values - iterator, err := c.ctrl.prm.LocalTrustSource.InitIterator(c.ep) - if err != nil { - c.log.Debug(logs.ControllerCouldNotInitializeIteratorOverLocalTrustValues, - zap.String("error", err.Error()), - ) - - return - } - - // initialize target of local trust values - targetWriter, err := c.ctrl.prm.LocalTrustTarget.InitWriter(c.ep) - if err != nil { - c.log.Debug(logs.ControllerCouldNotInitializeLocalTrustTarget, - zap.String("error", err.Error()), - ) - - return - } - - // iterate over all values and write them to the target - err = iterator.Iterate( - func(t reputation.Trust) error { - // check if context is done - if err := ctx.Err(); err != nil { - return err - } - - return targetWriter.Write(ctx, t) - }, - ) - if err != nil && !errors.Is(err, context.Canceled) { - c.log.Debug(logs.ControllerIteratorOverLocalTrustFailed, - zap.String("error", err.Error()), - ) - - return - } - - // finish writing - err = targetWriter.Close(ctx) - if err != nil { - c.log.Debug(logs.ControllerCouldNotFinishWritingLocalTrustValues, - zap.String("error", err.Error()), - ) - - return - } - - c.log.Debug(logs.ControllerReportingSuccessfullyFinished) -} - -func (c *Controller) freeReport(epoch uint64, log *logger.Logger) { - var stopped bool - - c.mtx.Lock() - - { - var cancel context.CancelFunc - - cancel, stopped = c.mCtx[epoch] - - if stopped { - cancel() - delete(c.mCtx, epoch) - } - } - - c.mtx.Unlock() - - if stopped { - log.Debug(logs.ControllerReportingSuccessfullyInterrupted) - } else { - log.Debug(logs.ControllerReportingIsNotStartedOrAlreadyInterrupted) - } -} - -// StopPrm groups the required parameters of the Controller.Stop method. -type StopPrm struct { - epoch uint64 -} - -// SetEpoch sets epoch number the processing of the values of which must be interrupted. -func (p *StopPrm) SetEpoch(e uint64) { - p.epoch = e -} - -// Stop interrupts the processing of local trust values. -// -// Releases acquired report context. -func (c *Controller) Stop(prm StopPrm) { - c.freeReport( - prm.epoch, - &logger.Logger{Logger: c.opts.log.With(zap.Uint64("epoch", prm.epoch))}, - ) -} diff --git a/pkg/services/reputation/local/controller/controller.go b/pkg/services/reputation/local/controller/controller.go deleted file mode 100644 index 373df36db7..0000000000 --- a/pkg/services/reputation/local/controller/controller.go +++ /dev/null @@ -1,84 +0,0 @@ -package trustcontroller - -import ( - "context" - "fmt" - "sync" - - reputationrouter "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common/router" -) - -// Prm groups the required parameters of the Controller's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Iterator over the reputation values - // collected by the node locally. - // - // Must not be nil. - LocalTrustSource IteratorProvider - - // Place of recording the local values of - // trust to other nodes. - // - // Must not be nil. - LocalTrustTarget *reputationrouter.Router -} - -// Controller represents main handler for starting -// and interrupting the reporting local trust values. -// -// It binds the interfaces of the local value stores -// to the target storage points. Controller is abstracted -// from the internal storage device and the network location -// of the connecting components. At its core, it is a -// high-level start-stop trigger for reporting. -// -// For correct operation, the controller must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the constructor is immediately ready to work through -// API of external control of calculations and data transfer. -type Controller struct { - prm Prm - - opts *options - - mtx sync.Mutex - mCtx map[uint64]context.CancelFunc -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -// New creates a new instance of the Controller. -// -// Panics if at least one value of the parameters is invalid. -// -// The created Controller does not require additional -// initialization and is completely ready for work. -func New(prm Prm, opts ...Option) *Controller { - switch { - case prm.LocalTrustSource == nil: - panicOnPrmValue("LocalTrustSource", prm.LocalTrustSource) - case prm.LocalTrustTarget == nil: - panicOnPrmValue("LocalTrustTarget", prm.LocalTrustTarget) - } - - o := defaultOpts() - - for _, opt := range opts { - opt(o) - } - - return &Controller{ - prm: prm, - opts: o, - mCtx: make(map[uint64]context.CancelFunc), - } -} diff --git a/pkg/services/reputation/local/controller/deps.go b/pkg/services/reputation/local/controller/deps.go deleted file mode 100644 index 6f4a29c997..0000000000 --- a/pkg/services/reputation/local/controller/deps.go +++ /dev/null @@ -1,34 +0,0 @@ -package trustcontroller - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" -) - -// Iterator is a group of methods provided by entity -// which can iterate over a group of reputation.Trust values. -type Iterator interface { - // Iterate must start an iterator over all trust values. - // For each value should call a handler, the error - // of which should be directly returned from the method. - // - // Internal failures of the iterator are also signaled via - // an error. After a successful call to the last value - // handler, nil should be returned. - Iterate(reputation.TrustHandler) error -} - -// IteratorProvider is a group of methods provided -// by entity which generates iterators over -// reputation.Trust values. -type IteratorProvider interface { - // InitIterator should return an initialized Iterator - // that iterates over values from IteratorContext.Epoch() epoch. - // - // Initialization problems are reported via error. - // If no error was returned, then the Iterator must not be nil. - // - // Implementations can have different logic for different - // contexts, so specific ones may document their own behavior. - InitIterator(common.EpochProvider) (Iterator, error) -} diff --git a/pkg/services/reputation/local/controller/opts.go b/pkg/services/reputation/local/controller/opts.go deleted file mode 100644 index 385a4243b0..0000000000 --- a/pkg/services/reputation/local/controller/opts.go +++ /dev/null @@ -1,30 +0,0 @@ -package trustcontroller - -import ( - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" - "go.uber.org/zap" -) - -// Option sets an optional parameter of Controller. -type Option func(*options) - -type options struct { - log *logger.Logger -} - -func defaultOpts() *options { - return &options{ - log: &logger.Logger{Logger: zap.L()}, - } -} - -// WithLogger returns option to specify logging component. -// -// Ignores nil values. -func WithLogger(l *logger.Logger) Option { - return func(o *options) { - if l != nil { - o.log = l - } - } -} diff --git a/pkg/services/reputation/local/controller/util.go b/pkg/services/reputation/local/controller/util.go deleted file mode 100644 index 122550498e..0000000000 --- a/pkg/services/reputation/local/controller/util.go +++ /dev/null @@ -1,32 +0,0 @@ -package trustcontroller - -import "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - -type storageWrapper struct { - w common.Writer - i Iterator -} - -func (s storageWrapper) InitIterator(common.EpochProvider) (Iterator, error) { - return s.i, nil -} - -func (s storageWrapper) InitWriter(common.EpochProvider) (common.Writer, error) { - return s.w, nil -} - -// SimpleIteratorProvider returns IteratorProvider that provides -// static context-independent Iterator. -func SimpleIteratorProvider(i Iterator) IteratorProvider { - return &storageWrapper{ - i: i, - } -} - -// SimpleWriterProvider returns WriterProvider that provides -// static context-independent Writer. -func SimpleWriterProvider(w common.Writer) common.WriterProvider { - return &storageWrapper{ - w: w, - } -} diff --git a/pkg/services/reputation/local/routes/builder.go b/pkg/services/reputation/local/routes/builder.go deleted file mode 100644 index ddd5a2ae0d..0000000000 --- a/pkg/services/reputation/local/routes/builder.go +++ /dev/null @@ -1,59 +0,0 @@ -package routes - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/util/logger" -) - -// Prm groups the required parameters of the Builder's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct { - // Manager builder for current node. - // - // Must not be nil. - ManagerBuilder common.ManagerBuilder - - Log *logger.Logger -} - -// Builder represents component that routes node to its managers. -// -// For correct operation, Builder must be created using -// the constructor (New) based on the required parameters -// and optional components. After successful creation, -// the Builder is immediately ready to work through API. -type Builder struct { - managerBuilder common.ManagerBuilder - log *logger.Logger -} - -const invalidPrmValFmt = "invalid parameter %s (%T):%v" - -func panicOnPrmValue(n string, v any) { - panic(fmt.Sprintf(invalidPrmValFmt, n, v, v)) -} - -// New creates a new instance of the Builder. -// -// Panics if at least one value of the parameters is invalid. -// -// The created Builder does not require additional -// initialization and is completely ready for work. -func New(prm Prm) *Builder { - switch { - case prm.ManagerBuilder == nil: - panicOnPrmValue("ManagerBuilder", prm.ManagerBuilder) - case prm.Log == nil: - panicOnPrmValue("Logger", prm.Log) - } - - return &Builder{ - managerBuilder: prm.ManagerBuilder, - log: prm.Log, - } -} diff --git a/pkg/services/reputation/local/routes/calls.go b/pkg/services/reputation/local/routes/calls.go deleted file mode 100644 index 2f99f0e105..0000000000 --- a/pkg/services/reputation/local/routes/calls.go +++ /dev/null @@ -1,33 +0,0 @@ -package routes - -import ( - "fmt" - - "git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation/common" - "go.uber.org/zap" -) - -// NextStage builds Manager list for trusting node and returns it directly. -// -// If passed route has more than one point, then endpoint of the route is reached. -func (b *Builder) NextStage(epoch uint64, t reputation.Trust, passed []common.ServerInfo) ([]common.ServerInfo, error) { - passedLen := len(passed) - - b.log.Debug(logs.RoutesBuildingNextStageForLocalTrustRoute, - zap.Uint64("epoch", epoch), - zap.Int("passed_length", passedLen), - ) - - if passedLen > 1 { - return nil, nil - } - - route, err := b.managerBuilder.BuildManagers(epoch, t.TrustingPeer()) - if err != nil { - return nil, fmt.Errorf("could not build managers for epoch: %d: %w", epoch, err) - } - - return route, nil -} diff --git a/pkg/services/reputation/local/storage/calls.go b/pkg/services/reputation/local/storage/calls.go deleted file mode 100644 index 14acbb64f1..0000000000 --- a/pkg/services/reputation/local/storage/calls.go +++ /dev/null @@ -1,175 +0,0 @@ -package truststorage - -import ( - "errors" - "sync" - - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/reputation" - apireputation "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// UpdatePrm groups the parameters of Storage's Update operation. -type UpdatePrm struct { - sat bool - - epoch uint64 - - peer apireputation.PeerID -} - -// SetEpoch sets number of the epoch -// when the interaction happened. -func (p *UpdatePrm) SetEpoch(e uint64) { - p.epoch = e -} - -// SetPeer sets identifier of the peer -// with which the local node interacted. -func (p *UpdatePrm) SetPeer(id apireputation.PeerID) { - p.peer = id -} - -// SetSatisfactory sets successful completion status. -func (p *UpdatePrm) SetSatisfactory(sat bool) { - p.sat = sat -} - -type trustValue struct { - sat, all int -} - -// EpochTrustValueStorage represents storage of -// the trust values by particular epoch. -type EpochTrustValueStorage struct { - mtx sync.RWMutex - - mItems map[string]*trustValue -} - -func newTrustValueStorage() *EpochTrustValueStorage { - return &EpochTrustValueStorage{ - mItems: make(map[string]*trustValue, 1), - } -} - -func stringifyPeerID(id apireputation.PeerID) string { - return string(id.PublicKey()) -} - -func peerIDFromString(str string) (res apireputation.PeerID) { - res.SetPublicKey([]byte(str)) - return -} - -func (s *EpochTrustValueStorage) update(prm UpdatePrm) { - s.mtx.Lock() - - { - strID := stringifyPeerID(prm.peer) - - val, ok := s.mItems[strID] - if !ok { - val = new(trustValue) - s.mItems[strID] = val - } - - if prm.sat { - val.sat++ - } - - val.all++ - } - - s.mtx.Unlock() -} - -// Update updates the number of satisfactory transactions with peer. -func (s *Storage) Update(prm UpdatePrm) { - var trustStorage *EpochTrustValueStorage - - s.mtx.Lock() - - { - var ( - ok bool - epoch = prm.epoch - ) - - trustStorage, ok = s.mItems[epoch] - if !ok { - trustStorage = newTrustValueStorage() - s.mItems[epoch] = trustStorage - } - } - - s.mtx.Unlock() - - trustStorage.update(prm) -} - -// ErrNoPositiveTrust is returned by iterator when -// there is no positive number of successful transactions. -var ErrNoPositiveTrust = errors.New("no positive trust") - -// DataForEpoch returns EpochValueStorage for epoch. -// -// If there is no data for the epoch, ErrNoPositiveTrust returns. -func (s *Storage) DataForEpoch(epoch uint64) (*EpochTrustValueStorage, error) { - s.mtx.RLock() - trustStorage, ok := s.mItems[epoch] - s.mtx.RUnlock() - - if !ok { - return nil, ErrNoPositiveTrust - } - - return trustStorage, nil -} - -// Iterate iterates over normalized trust values and passes them to parameterized handler. -// -// Values are normalized according to http://ilpubs.stanford.edu:8090/562/1/2002-56.pdf Chapter 4.5. -// If divisor in formula is zero, ErrNoPositiveTrust returns. -func (s *EpochTrustValueStorage) Iterate(h reputation.TrustHandler) (err error) { - s.mtx.RLock() - - { - var ( - sum reputation.TrustValue - mVals = make(map[string]reputation.TrustValue, len(s.mItems)) - ) - - // iterate first time to calculate normalizing divisor - for strID, val := range s.mItems { - if val.all > 0 { - num := reputation.TrustValueFromInt(val.sat) - denom := reputation.TrustValueFromInt(val.all) - - v := num.Div(denom) - - mVals[strID] = v - - sum.Add(v) - } - } - - err = ErrNoPositiveTrust - - if !sum.IsZero() { - for strID, val := range mVals { - t := reputation.Trust{} - - t.SetPeer(peerIDFromString(strID)) - t.SetValue(val.Div(sum)) - - if err = h(t); err != nil { - break - } - } - } - } - - s.mtx.RUnlock() - - return -} diff --git a/pkg/services/reputation/local/storage/storage.go b/pkg/services/reputation/local/storage/storage.go deleted file mode 100644 index d7e54a3fc8..0000000000 --- a/pkg/services/reputation/local/storage/storage.go +++ /dev/null @@ -1,41 +0,0 @@ -package truststorage - -import ( - "sync" -) - -// Prm groups the required parameters of the Storage's constructor. -// -// All values must comply with the requirements imposed on them. -// Passing incorrect parameter values will result in constructor -// failure (error or panic depending on the implementation). -type Prm struct{} - -// Storage represents in-memory storage of -// local reputation values. -// -// Storage provides access to normalized local trust -// values through iterator interface. -// -// For correct operation, Storage must be created -// using the constructor (New) based on the required parameters -// and optional components. After successful creation, -// Storage is immediately ready to work through API. -type Storage struct { - prm Prm - - mtx sync.RWMutex - - mItems map[uint64]*EpochTrustValueStorage -} - -// New creates a new instance of the Storage. -// -// The created Storage does not require additional -// initialization and is completely ready for work. -func New(prm Prm) *Storage { - return &Storage{ - prm: prm, - mItems: make(map[uint64]*EpochTrustValueStorage), - } -} diff --git a/pkg/services/reputation/rpc/response.go b/pkg/services/reputation/rpc/response.go deleted file mode 100644 index 808a0a4767..0000000000 --- a/pkg/services/reputation/rpc/response.go +++ /dev/null @@ -1,50 +0,0 @@ -package reputationrpc - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/util" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/util/response" -) - -type responseService struct { - respSvc *response.Service - - svc Server -} - -// NewResponseService returns reputation service server instance that passes -// internal service call to response service. -func NewResponseService(cnrSvc Server, respSvc *response.Service) Server { - return &responseService{ - respSvc: respSvc, - svc: cnrSvc, - } -} - -func (s *responseService) AnnounceLocalTrust(ctx context.Context, req *reputation.AnnounceLocalTrustRequest) (*reputation.AnnounceLocalTrustResponse, error) { - resp, err := s.respSvc.HandleUnaryRequest(ctx, req, - func(ctx context.Context, req any) (util.ResponseMessage, error) { - return s.svc.AnnounceLocalTrust(ctx, req.(*reputation.AnnounceLocalTrustRequest)) - }, - ) - if err != nil { - return nil, err - } - - return resp.(*reputation.AnnounceLocalTrustResponse), nil -} - -func (s *responseService) AnnounceIntermediateResult(ctx context.Context, req *reputation.AnnounceIntermediateResultRequest) (*reputation.AnnounceIntermediateResultResponse, error) { - resp, err := s.respSvc.HandleUnaryRequest(ctx, req, - func(ctx context.Context, req any) (util.ResponseMessage, error) { - return s.svc.AnnounceIntermediateResult(ctx, req.(*reputation.AnnounceIntermediateResultRequest)) - }, - ) - if err != nil { - return nil, err - } - - return resp.(*reputation.AnnounceIntermediateResultResponse), nil -} diff --git a/pkg/services/reputation/rpc/server.go b/pkg/services/reputation/rpc/server.go deleted file mode 100644 index 78af30ea7b..0000000000 --- a/pkg/services/reputation/rpc/server.go +++ /dev/null @@ -1,13 +0,0 @@ -package reputationrpc - -import ( - "context" - - "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation" -) - -// Server is an interface of the FrostFS API v2 Reputation service server. -type Server interface { - AnnounceLocalTrust(context.Context, *reputation.AnnounceLocalTrustRequest) (*reputation.AnnounceLocalTrustResponse, error) - AnnounceIntermediateResult(context.Context, *reputation.AnnounceIntermediateResultRequest) (*reputation.AnnounceIntermediateResultResponse, error) -} diff --git a/pkg/services/reputation/rpc/sign.go b/pkg/services/reputation/rpc/sign.go deleted file mode 100644 index 9db06ff1ef..0000000000 --- a/pkg/services/reputation/rpc/sign.go +++ /dev/null @@ -1,54 +0,0 @@ -package reputationrpc - -import ( - "context" - "crypto/ecdsa" - - "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/reputation" - "git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/util" -) - -type signService struct { - sigSvc *util.SignService - - svc Server -} - -func NewSignService(key *ecdsa.PrivateKey, svc Server) Server { - return &signService{ - sigSvc: util.NewUnarySignService(key), - svc: svc, - } -} - -func (s *signService) AnnounceLocalTrust(ctx context.Context, req *reputation.AnnounceLocalTrustRequest) (*reputation.AnnounceLocalTrustResponse, error) { - resp, err := s.sigSvc.HandleUnaryRequest(ctx, req, - func(ctx context.Context, req any) (util.ResponseMessage, error) { - return s.svc.AnnounceLocalTrust(ctx, req.(*reputation.AnnounceLocalTrustRequest)) - }, - func() util.ResponseMessage { - return new(reputation.AnnounceLocalTrustResponse) - }, - ) - if err != nil { - return nil, err - } - - return resp.(*reputation.AnnounceLocalTrustResponse), nil -} - -func (s *signService) AnnounceIntermediateResult(ctx context.Context, req *reputation.AnnounceIntermediateResultRequest) (*reputation.AnnounceIntermediateResultResponse, error) { - resp, err := s.sigSvc.HandleUnaryRequest(ctx, req, - func(ctx context.Context, req any) (util.ResponseMessage, error) { - return s.svc.AnnounceIntermediateResult(ctx, req.(*reputation.AnnounceIntermediateResultRequest)) - }, - func() util.ResponseMessage { - return new(reputation.AnnounceIntermediateResultResponse) - }, - ) - if err != nil { - return nil, err - } - - return resp.(*reputation.AnnounceIntermediateResultResponse), nil -} diff --git a/pkg/services/reputation/trust.go b/pkg/services/reputation/trust.go deleted file mode 100644 index 8c5d9091a3..0000000000 --- a/pkg/services/reputation/trust.go +++ /dev/null @@ -1,102 +0,0 @@ -package reputation - -import ( - "strconv" - - "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/reputation" -) - -// TrustValue represents the numeric value of the node's trust. -type TrustValue float64 - -const ( - // TrustOne is a trust value equal to one. - TrustOne = TrustValue(1) - - // TrustZero is a trust value equal to zero. - TrustZero = TrustValue(0) -) - -// TrustValueFromFloat64 converts float64 to TrustValue. -func TrustValueFromFloat64(v float64) TrustValue { - return TrustValue(v) -} - -// TrustValueFromInt converts int to TrustValue. -func TrustValueFromInt(v int) TrustValue { - return TrustValue(v) -} - -func (v TrustValue) String() string { - return strconv.FormatFloat(float64(v), 'f', -1, 64) -} - -// Float64 converts TrustValue to float64. -func (v TrustValue) Float64() float64 { - return float64(v) -} - -// Add adds v2 to v. -func (v *TrustValue) Add(v2 TrustValue) { - *v = *v + v2 -} - -// Div returns the result of dividing v by v2. -func (v TrustValue) Div(v2 TrustValue) TrustValue { - return v / v2 -} - -// Mul multiplies v by v2. -func (v *TrustValue) Mul(v2 TrustValue) { - *v *= v2 -} - -// IsZero returns true if v equal to zero. -func (v TrustValue) IsZero() bool { - return v == 0 -} - -// Trust represents peer's trust (reputation). -type Trust struct { - trusting, peer reputation.PeerID - - val TrustValue -} - -// TrustHandler describes the signature of the reputation.Trust -// value handling function. -// -// Termination of processing without failures is usually signaled -// with a zero error, while a specific value may describe the reason -// for failure. -type TrustHandler func(Trust) error - -// Value returns peer's trust value. -func (t Trust) Value() TrustValue { - return t.val -} - -// SetValue sets peer's trust value. -func (t *Trust) SetValue(val TrustValue) { - t.val = val -} - -// Peer returns trusted peer ID. -func (t Trust) Peer() reputation.PeerID { - return t.peer -} - -// SetPeer sets trusted peer ID. -func (t *Trust) SetPeer(id reputation.PeerID) { - t.peer = id -} - -// TrustingPeer returns trusting peer ID. -func (t Trust) TrustingPeer() reputation.PeerID { - return t.trusting -} - -// SetTrustingPeer sets trusting peer ID. -func (t *Trust) SetTrustingPeer(id reputation.PeerID) { - t.trusting = id -}