From c003c2fc189748f082c09a2b4a729eb1c5732668 Mon Sep 17 00:00:00 2001 From: Linus Nordberg Date: Tue, 24 May 2022 23:33:38 +0200 Subject: wip --- pkg/state/single.go | 60 +++++++++++++++++++++++++++++++++++++++++++++++++---- 1 file changed, 56 insertions(+), 4 deletions(-) (limited to 'pkg/state/single.go') diff --git a/pkg/state/single.go b/pkg/state/single.go index 695f0e3..2e44fee 100644 --- a/pkg/state/single.go +++ b/pkg/state/single.go @@ -8,18 +8,21 @@ import ( "sync" "time" + "git.sigsum.org/log-go/pkg/client" "git.sigsum.org/log-go/pkg/db" "git.sigsum.org/sigsum-go/pkg/log" + //"git.sigsum.org/sigsum-go/pkg/requests" "git.sigsum.org/sigsum-go/pkg/types" ) -// StateManagerSingle implements a single-instance StateManager +// StateManagerSingle implements a single-instance StateManager for primary nodes type StateManagerSingle struct { client db.Client signer crypto.Signer namespace types.Hash interval time.Duration deadline time.Duration + secondary *client.Client // Lock-protected access to pointers. A write lock is only obtained once // per interval when doing pointer rotation. All endpoints are readers. @@ -32,13 +35,14 @@ type StateManagerSingle struct { cosignatures map[types.Hash]*types.Signature } -func NewStateManagerSingle(client db.Client, signer crypto.Signer, interval, deadline time.Duration) (*StateManagerSingle, error) { +func NewStateManagerSingle(dbcli db.Client, signer crypto.Signer, interval, deadline time.Duration, securl string, secpk types.PublicKey) (*StateManagerSingle, error) { sm := &StateManagerSingle{ - client: client, + client: dbcli, signer: signer, namespace: *types.HashFn(signer.Public().(ed25519.PublicKey)), interval: interval, deadline: deadline, + secondary: client.NewClient(securl, secpk), } sth, err := sm.latestSTH(context.Background()) sm.setCosignedTreeHead() @@ -157,9 +161,57 @@ func (sm *StateManagerSingle) latestSTH(ctx context.Context) (*types.SignedTreeH if err != nil { return nil, fmt.Errorf("failed fetching tree head: %v", err) } - sth, err := th.Sign(sm.signer, &sm.namespace) + + //pth, err := choseTree(ctx, sm.deadline, sm.secondary, th) + pth, err := th, nil // DEBUG + if err != nil { + return nil, fmt.Errorf("failed chosing tree head: %v", err) + } + + sth, err := pth.Sign(sm.signer, &sm.namespace) if err != nil { return nil, fmt.Errorf("failed signing tree head: %v", err) } + return sth, nil } + +func choseTree(ctx context.Context, deadline time.Duration, secondary *client.Client, th *types.TreeHead) (*types.TreeHead, error) { + // TODO: handle multiple secondaries and not just one + + if !secondary.Configured { + return th, nil + } + + sctx, cancel := context.WithTimeout(ctx, deadline) // FIXME: use a separate timeout value for secondaries? + defer cancel() + secsth, err := secondary.GetCurrentTreeHead(sctx) + if err != nil { + return nil, fmt.Errorf("failed getting the latest tree head from all secondaries: %v", err) + } + + if secsth.TreeSize < th.TreeSize { + // We're stuck at secsth.size so let's verify + // consistency since secsth and sign that + + // TODO: get and verify consinstency proof + + // req := &requests.ConsistencyProof{ + // OldSize: secsth.TreeSize, + // NewSize: th.TreeSize, + // } + + // proof, err := sm.client.GetConsistencyProof(ctx, req) + // if err != nil { + // return nil, fmt.Errorf("unable to get consistency proof from %d to %d: %v", req.OldSize, req.NewSize, err) + // } + + // if !proof.Verify() { + // return nil, fmt.Errorf("invalid consistency proof from %d to %d", req.OldSize, req.NewSize) + // } + + th = &secsth.TreeHead // FIXME: need to copy? + } + + return th, nil +} -- cgit v1.2.3