Generated design docs and implementation plans via Codex for: - Batch 6: Opts package-level functions - Batch 7: Opts class methods + Reload - Batch 9: Auth, DirStore, OCSP foundations - Batch 10: OCSP Cache + JS Events - Batch 11: FileStore Init - Batch 12: FileStore Recovery - Batch 16: Client Core (first half) - Batch 17: Client Core (second half) All plans include mandatory verification protocol and anti-stub guardrails. Updated batches.md with file paths and planned status.
5.3 KiB
5.3 KiB
Batch 11 FileStore Init Design
Date: 2026-02-27
Batch: 11 (FileStore Init)
Dependency: Batch 8 (Store Interfaces)
Scope: 39 features + 123 tests mapped to server/filestore.go
1. Context and Constraints
- Batch 11 is currently
pendingwith all 39 features and all 123 tests indeferredstatus. - Current .NET
JetStreamFileStoreimplementation is mostly a delegation shell toJetStreamMemStore; most Batch 11 methods are not present yet. - Existing backlog tests for this area include placeholder-style tests that must not be treated as verification evidence.
- Planning only in this session: produce design + implementation plan documents, no runtime code changes.
2. Success Criteria
- Implement all Batch 11 feature IDs with real C# behavior matching Go intent for
filestore.goinitialization-related scope. - Port and verify all Batch 11 tests into real behavioral tests (no placeholder assertions).
- Enforce strict verification and anti-stub guardrails before any status updates.
- Preserve dependency order and use PortTracker updates with evidence-backed chunks.
3. Approach Options
Option A (Recommended): Vertical feature groups with co-evolving tests
Implement features in 3 groups (17, 16, 6 features), each followed by targeted test waves and status updates.
- Pros: bounded risk, quick feedback, easier rollback and review, aligns with dependency and guardrail requirements.
- Cons: repeated build/test cycles increase total command count.
Option B: Implement all 39 features first, then all 123 tests
- Pros: fewer context switches between prod/test files.
- Cons: very high integration risk; defects surface late; hard to attribute failures to specific changes.
Option C: Utilities-first (helpers, codecs, file writers) then constructors/recovery
- Pros: helper APIs stabilize early.
- Cons: delayed validation of end-to-end init behavior; tends to accumulate partial implementations.
Recommendation
Use Option A. This gives the strongest control over regressions and makes status updates defensible under audit.
4. Proposed Design
4.1 Feature Workstreams (max ~20 features/group)
- Group 1: Store creation + encryption bootstrap + metadata + block recovery (17 features)
IDs:955, 956, 957, 958, 960, 961, 962, 963, 964, 965, 966, 967, 968, 969, 970, 972, 974 - Group 2: Lost-data/state rebuild + tracking/utilities (16 features)
IDs:975, 976, 978, 979, 980, 989, 990, 998, 1057, 1152, 1153, 1154, 1158, 1163, 1164, 1165 - Group 3: Init semaphore + consumer decode + atomic file writes (6 features)
IDs:1200, 1235, 1239, 1248, 1261, 1262
4.2 File Boundaries
- Primary production files:
dotnet/src/ZB.MOM.NatsNet.Server/JetStream/FileStore.csdotnet/src/ZB.MOM.NatsNet.Server/JetStream/MessageBlock.csdotnet/src/ZB.MOM.NatsNet.Server/JetStream/FileStoreTypes.cs
- Primary test files:
dotnet/tests/ZB.MOM.NatsNet.Server.Tests/ImplBacklog/JetStreamFileStoreTests.Impltests.csdotnet/tests/ZB.MOM.NatsNet.Server.Tests/ImplBacklog/ConcurrencyTests1.Impltests.csdotnet/tests/ZB.MOM.NatsNet.Server.Tests/ImplBacklog/ConcurrencyTests2.Impltests.cs
4.3 Data/Control Flow to Port
newFileStoreWithCreatedbootstrap flow:- validate config and storage mode
- apply dynamic block sizing defaults
- verify/create directories and writable checks
- initialize hash/checksum state and encryption metadata
- recover persisted stream/message state
- enforce limits and age/timer setup
- start background flush/state loops
- Supporting flows:
- message block buffer pooling and recycling
- block encryption key generation/recovery
- lost data tracking and rebuild state accounting
- consumer state binary header/decode path
- atomic write helpers with optional sync and directory sync
4.4 Error Handling Design
- Preserve failure semantics from Go intent:
- reject invalid storage config early
- propagate IO/crypto errors with contextual messages
- fail closed for corrupt headers / decode failures
- avoid silent fallback to placeholder behavior
- Ensure lock discipline for shared mutable state and block-level operations.
4.5 Test Design
- Replace placeholder backlog tests with behavior-focused tests derived from Go cases.
- Keep benchmark-mapped tests as either:
- converted deterministic assertions where appropriate, or
- deferred with explicit infrastructure/perf rationale.
- Include focused regression tests for encryption key lifecycle, metadata integrity, state recovery, and consumer state decoding.
5. Risks and Mitigations
- Risk: large
filestore.gosurface can lead to stub creep.
Mitigation: mandatory stub scans for both src and tests, hard stop on matches. - Risk: hidden behavior coupling across utility methods.
Mitigation: group-based checkpoints with full build + targeted suite each cycle. - Risk: status drift (marking verified without evidence).
Mitigation: evidence logs required for every feature/test update, max 15 IDs per update.
6. Design Outcome
This design uses a strict vertical execution model with heavy verification gates. It is structured to be executed by a plan that enforces per-feature validation loops, anti-stub guardrails, and evidence-based PortTracker updates.