2016-11-09 04:01:56 +03:00
|
|
|
// Copyright 2016 The go-ethereum Authors
|
2016-10-14 06:51:29 +03:00
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package les
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"math/big"
|
2019-05-30 21:51:13 +03:00
|
|
|
"math/rand"
|
2019-08-03 15:36:10 +03:00
|
|
|
"net"
|
2016-10-14 06:51:29 +03:00
|
|
|
"sync"
|
2019-05-30 21:51:13 +03:00
|
|
|
"sync/atomic"
|
2017-03-22 22:44:22 +03:00
|
|
|
"time"
|
2016-10-14 06:51:29 +03:00
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2019-02-26 14:32:48 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common/mclock"
|
2019-05-30 21:51:13 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core"
|
2020-12-10 19:20:55 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/forkid"
|
2016-10-14 06:51:29 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
|
|
"github.com/ethereum/go-ethereum/les/flowcontrol"
|
2020-04-09 12:55:32 +03:00
|
|
|
lpc "github.com/ethereum/go-ethereum/les/lespay/client"
|
2020-09-14 23:44:20 +03:00
|
|
|
lps "github.com/ethereum/go-ethereum/les/lespay/server"
|
2020-03-31 18:17:24 +03:00
|
|
|
"github.com/ethereum/go-ethereum/les/utils"
|
2017-10-24 16:19:09 +03:00
|
|
|
"github.com/ethereum/go-ethereum/light"
|
2016-10-14 06:51:29 +03:00
|
|
|
"github.com/ethereum/go-ethereum/p2p"
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 10:34:02 +03:00
|
|
|
"github.com/ethereum/go-ethereum/params"
|
2016-10-14 06:51:29 +03:00
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-04-05 18:01:51 +03:00
|
|
|
errClosed = errors.New("peer set is closed")
|
|
|
|
errAlreadyRegistered = errors.New("peer is already registered")
|
|
|
|
errNotRegistered = errors.New("peer is not registered")
|
2016-10-14 06:51:29 +03:00
|
|
|
)
|
|
|
|
|
2019-06-12 14:09:40 +03:00
|
|
|
const (
|
|
|
|
maxRequestErrors = 20 // number of invalid requests tolerated (makes the protocol less brittle but still avoids spam)
|
|
|
|
maxResponseErrors = 50 // number of invalid responses tolerated (makes the protocol less brittle but still avoids spam)
|
2016-10-14 06:51:29 +03:00
|
|
|
|
2019-02-26 14:32:48 +03:00
|
|
|
allowedUpdateBytes = 100000 // initial/maximum allowed update size
|
|
|
|
allowedUpdateRate = time.Millisecond * 10 // time constant for recharging one byte of allowance
|
|
|
|
|
2019-05-30 21:51:13 +03:00
|
|
|
freezeTimeBase = time.Millisecond * 700 // fixed component of client freeze time
|
|
|
|
freezeTimeRandom = time.Millisecond * 600 // random component of client freeze time
|
|
|
|
freezeCheckPeriod = time.Millisecond * 100 // buffer value recheck period after initial freeze time has elapsed
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// If the total encoded size of a sent transaction batch is over txSizeCostLimit
|
|
|
|
// per transaction then the request cost is calculated as proportional to the
|
|
|
|
// encoded size instead of the transaction count
|
|
|
|
txSizeCostLimit = 0x4000
|
|
|
|
|
|
|
|
// handshakeTimeout is the timeout LES handshake will be treated as failed.
|
|
|
|
handshakeTimeout = 5 * time.Second
|
|
|
|
)
|
2019-02-26 14:32:48 +03:00
|
|
|
|
2017-10-24 16:19:09 +03:00
|
|
|
const (
|
|
|
|
announceTypeNone = iota
|
|
|
|
announceTypeSimple
|
|
|
|
announceTypeSigned
|
|
|
|
)
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
type keyValueEntry struct {
|
|
|
|
Key string
|
|
|
|
Value rlp.RawValue
|
|
|
|
}
|
2016-10-14 06:51:29 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
type keyValueList []keyValueEntry
|
|
|
|
type keyValueMap map[string]rlp.RawValue
|
2016-10-14 06:51:29 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
func (l keyValueList) add(key string, val interface{}) keyValueList {
|
|
|
|
var entry keyValueEntry
|
|
|
|
entry.Key = key
|
|
|
|
if val == nil {
|
|
|
|
val = uint64(0)
|
|
|
|
}
|
|
|
|
enc, err := rlp.EncodeToBytes(val)
|
|
|
|
if err == nil {
|
|
|
|
entry.Value = enc
|
|
|
|
}
|
|
|
|
return append(l, entry)
|
|
|
|
}
|
2019-02-26 14:32:48 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
func (l keyValueList) decode() (keyValueMap, uint64) {
|
|
|
|
m := make(keyValueMap)
|
|
|
|
var size uint64
|
|
|
|
for _, entry := range l {
|
|
|
|
m[entry.Key] = entry.Value
|
|
|
|
size += uint64(len(entry.Key)) + uint64(len(entry.Value)) + 8
|
|
|
|
}
|
|
|
|
return m, size
|
|
|
|
}
|
2019-08-27 14:07:25 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
func (m keyValueMap) get(key string, val interface{}) error {
|
|
|
|
enc, ok := m[key]
|
|
|
|
if !ok {
|
|
|
|
return errResp(ErrMissingKey, "%s", key)
|
|
|
|
}
|
|
|
|
if val == nil {
|
|
|
|
return nil
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
return rlp.DecodeBytes(enc, val)
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// peerCommons contains fields needed by both server peer and client peer.
|
|
|
|
type peerCommons struct {
|
|
|
|
*p2p.Peer
|
|
|
|
rw p2p.MsgReadWriter
|
2019-08-03 15:36:10 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
id string // Peer identity.
|
|
|
|
version int // Protocol version negotiated.
|
|
|
|
network uint64 // Network ID being on.
|
|
|
|
frozen uint32 // Flag whether the peer is frozen.
|
|
|
|
announceType uint64 // New block announcement type.
|
2020-03-12 13:25:52 +03:00
|
|
|
serving uint32 // The status indicates the peer is served.
|
2020-10-21 11:56:33 +03:00
|
|
|
headInfo blockInfo // Last announced block information.
|
2016-10-14 06:51:29 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// Background task queue for caching peer tasks and executing in order.
|
2020-03-31 18:17:24 +03:00
|
|
|
sendQueue *utils.ExecQueue
|
2019-05-30 21:51:13 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// Flow control agreement.
|
|
|
|
fcParams flowcontrol.ServerParams // The config for token bucket.
|
|
|
|
fcCosts requestCostTable // The Maximum request cost table.
|
|
|
|
|
|
|
|
closeCh chan struct{}
|
|
|
|
lock sync.RWMutex // Lock used to protect all thread-sensitive fields.
|
2019-05-30 21:51:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// isFrozen returns true if the client is frozen or the server has put our
|
|
|
|
// client in frozen state
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *peerCommons) isFrozen() bool {
|
2019-05-30 21:51:13 +03:00
|
|
|
return atomic.LoadUint32(&p.frozen) != 0
|
|
|
|
}
|
|
|
|
|
2020-05-25 11:21:28 +03:00
|
|
|
// canQueue returns an indicator whether the peer can queue an operation.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *peerCommons) canQueue() bool {
|
2020-03-31 18:17:24 +03:00
|
|
|
return p.sendQueue.CanQueue() && !p.isFrozen()
|
2017-03-22 22:44:22 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// queueSend caches a peer operation in the background task queue.
|
|
|
|
// Please ensure to check `canQueue` before call this function
|
|
|
|
func (p *peerCommons) queueSend(f func()) bool {
|
2020-03-31 18:17:24 +03:00
|
|
|
return p.sendQueue.Queue(f)
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// String implements fmt.Stringer.
|
|
|
|
func (p *peerCommons) String() string {
|
|
|
|
return fmt.Sprintf("Peer %s [%s]", p.id, fmt.Sprintf("les/%d", p.version))
|
2017-03-22 22:44:22 +03:00
|
|
|
}
|
|
|
|
|
2020-12-14 12:27:15 +03:00
|
|
|
// PeerInfo represents a short summary of the `eth` sub-protocol metadata known
|
|
|
|
// about a connected peer.
|
|
|
|
type PeerInfo struct {
|
|
|
|
Version int `json:"version"` // Ethereum protocol version negotiated
|
|
|
|
Difficulty *big.Int `json:"difficulty"` // Total difficulty of the peer's blockchain
|
|
|
|
Head string `json:"head"` // SHA3 hash of the peer's best owned block
|
|
|
|
}
|
|
|
|
|
2016-10-14 06:51:29 +03:00
|
|
|
// Info gathers and returns a collection of metadata known about a peer.
|
2020-12-14 12:27:15 +03:00
|
|
|
func (p *peerCommons) Info() *PeerInfo {
|
|
|
|
return &PeerInfo{
|
2016-10-14 06:51:29 +03:00
|
|
|
Version: p.version,
|
|
|
|
Difficulty: p.Td(),
|
|
|
|
Head: fmt.Sprintf("%x", p.Head()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Head retrieves a copy of the current head (most recent) hash of the peer.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *peerCommons) Head() (hash common.Hash) {
|
2016-10-14 06:51:29 +03:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
return p.headInfo.Hash
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// Td retrieves the current total difficulty of a peer.
|
|
|
|
func (p *peerCommons) Td() *big.Int {
|
2016-10-14 06:51:29 +03:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
return new(big.Int).Set(p.headInfo.Td)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// HeadAndTd retrieves the current head hash and total difficulty of a peer.
|
|
|
|
func (p *peerCommons) HeadAndTd() (hash common.Hash, td *big.Int) {
|
2016-10-14 06:51:29 +03:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
return p.headInfo.Hash, new(big.Int).Set(p.headInfo.Td)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// sendReceiveHandshake exchanges handshake packet with remote peer and returns any error
|
|
|
|
// if failed to send or receive packet.
|
|
|
|
func (p *peerCommons) sendReceiveHandshake(sendList keyValueList) (keyValueList, error) {
|
|
|
|
var (
|
|
|
|
errc = make(chan error, 2)
|
|
|
|
recvList keyValueList
|
|
|
|
)
|
|
|
|
// Send out own handshake in a new thread
|
|
|
|
go func() {
|
|
|
|
errc <- p2p.Send(p.rw, StatusMsg, sendList)
|
|
|
|
}()
|
|
|
|
go func() {
|
|
|
|
// In the mean time retrieve the remote status message
|
|
|
|
msg, err := p.rw.ReadMsg()
|
|
|
|
if err != nil {
|
|
|
|
errc <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if msg.Code != StatusMsg {
|
|
|
|
errc <- errResp(ErrNoStatusMsg, "first msg has code %x (!= %x)", msg.Code, StatusMsg)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if msg.Size > ProtocolMaxMsgSize {
|
|
|
|
errc <- errResp(ErrMsgTooLarge, "%v > %v", msg.Size, ProtocolMaxMsgSize)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Decode the handshake
|
|
|
|
if err := msg.Decode(&recvList); err != nil {
|
|
|
|
errc <- errResp(ErrDecode, "msg %v: %v", msg, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
errc <- nil
|
|
|
|
}()
|
|
|
|
timeout := time.NewTimer(handshakeTimeout)
|
|
|
|
defer timeout.Stop()
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case err := <-errc:
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
case <-timeout.C:
|
|
|
|
return nil, p2p.DiscReadTimeout
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return recvList, nil
|
|
|
|
}
|
2016-10-14 06:51:29 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// handshake executes the les protocol handshake, negotiating version number,
|
|
|
|
// network IDs, difficulties, head and genesis blocks. Besides the basic handshake
|
|
|
|
// fields, server and client can exchange and resolve some specified fields through
|
|
|
|
// two callback functions.
|
2020-12-10 19:20:55 +03:00
|
|
|
func (p *peerCommons) handshake(td *big.Int, head common.Hash, headNum uint64, genesis common.Hash, forkID forkid.ID, forkFilter forkid.Filter, sendCallback func(*keyValueList), recvCallback func(keyValueMap) error) error {
|
2020-02-26 12:41:24 +03:00
|
|
|
p.lock.Lock()
|
|
|
|
defer p.lock.Unlock()
|
|
|
|
|
|
|
|
var send keyValueList
|
|
|
|
|
|
|
|
// Add some basic handshake fields
|
|
|
|
send = send.add("protocolVersion", uint64(p.version))
|
|
|
|
send = send.add("networkId", p.network)
|
2020-10-21 11:56:33 +03:00
|
|
|
// Note: the head info announced at handshake is only used in case of server peers
|
|
|
|
// but dummy values are still announced by clients for compatibility with older servers
|
2020-02-26 12:41:24 +03:00
|
|
|
send = send.add("headTd", td)
|
|
|
|
send = send.add("headHash", head)
|
|
|
|
send = send.add("headNum", headNum)
|
|
|
|
send = send.add("genesisHash", genesis)
|
|
|
|
|
2020-12-10 19:20:55 +03:00
|
|
|
// If the protocol version is beyond les4, then pass the forkID
|
|
|
|
// as well. Check http://eips.ethereum.org/EIPS/eip-2124 for more
|
|
|
|
// spec detail.
|
|
|
|
if p.version >= lpv4 {
|
|
|
|
send = send.add("forkID", forkID)
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
// Add client-specified or server-specified fields
|
|
|
|
if sendCallback != nil {
|
|
|
|
sendCallback(&send)
|
|
|
|
}
|
|
|
|
// Exchange the handshake packet and resolve the received one.
|
|
|
|
recvList, err := p.sendReceiveHandshake(send)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
recv, size := recvList.decode()
|
|
|
|
if size > allowedUpdateBytes {
|
|
|
|
return errResp(ErrRequestRejected, "")
|
|
|
|
}
|
2020-10-21 11:56:33 +03:00
|
|
|
var rGenesis common.Hash
|
|
|
|
var rVersion, rNetwork uint64
|
2020-02-26 12:41:24 +03:00
|
|
|
if err := recv.get("protocolVersion", &rVersion); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := recv.get("networkId", &rNetwork); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := recv.get("genesisHash", &rGenesis); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if rGenesis != genesis {
|
|
|
|
return errResp(ErrGenesisBlockMismatch, "%x (!= %x)", rGenesis[:8], genesis[:8])
|
|
|
|
}
|
|
|
|
if rNetwork != p.network {
|
|
|
|
return errResp(ErrNetworkIdMismatch, "%d (!= %d)", rNetwork, p.network)
|
|
|
|
}
|
|
|
|
if int(rVersion) != p.version {
|
|
|
|
return errResp(ErrProtocolVersionMismatch, "%d (!= %d)", rVersion, p.version)
|
|
|
|
}
|
2020-12-10 19:20:55 +03:00
|
|
|
// Check forkID if the protocol version is beyond the les4
|
|
|
|
if p.version >= lpv4 {
|
|
|
|
var forkID forkid.ID
|
|
|
|
if err := recv.get("forkID", &forkID); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := forkFilter(forkID); err != nil {
|
|
|
|
return errResp(ErrForkIDRejected, "%v", err)
|
|
|
|
}
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
if recvCallback != nil {
|
|
|
|
return recvCallback(recv)
|
|
|
|
}
|
|
|
|
return nil
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// close closes the channel and notifies all background routines to exit.
|
|
|
|
func (p *peerCommons) close() {
|
|
|
|
close(p.closeCh)
|
2020-03-31 18:17:24 +03:00
|
|
|
p.sendQueue.Quit()
|
2017-03-22 22:44:22 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// serverPeer represents each node to which the client is connected.
|
|
|
|
// The node here refers to the les server.
|
|
|
|
type serverPeer struct {
|
|
|
|
peerCommons
|
2019-02-26 14:32:48 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// Status fields
|
|
|
|
trusted bool // The flag whether the server is selected as trusted server.
|
|
|
|
onlyAnnounce bool // The flag whether the server sends announcement only.
|
|
|
|
chainSince, chainRecent uint64 // The range of chain server peer can serve.
|
|
|
|
stateSince, stateRecent uint64 // The range of state server peer can serve.
|
|
|
|
|
|
|
|
// Advertised checkpoint fields
|
|
|
|
checkpointNumber uint64 // The block height which the checkpoint is registered.
|
|
|
|
checkpoint params.TrustedCheckpoint // The advertised checkpoint sent by server.
|
|
|
|
|
2020-04-09 12:55:32 +03:00
|
|
|
fcServer *flowcontrol.ServerNode // Client side mirror token bucket.
|
|
|
|
vtLock sync.Mutex
|
|
|
|
valueTracker *lpc.ValueTracker
|
|
|
|
nodeValueTracker *lpc.NodeValueTracker
|
|
|
|
sentReqs map[uint64]sentReqEntry
|
2020-02-26 12:41:24 +03:00
|
|
|
|
|
|
|
// Statistics
|
2020-07-28 18:02:35 +03:00
|
|
|
errCount utils.LinearExpiredValue // Counter the invalid responses server has replied
|
2020-02-26 12:41:24 +03:00
|
|
|
updateCount uint64
|
|
|
|
updateTime mclock.AbsTime
|
|
|
|
|
2020-07-28 18:02:35 +03:00
|
|
|
// Test callback hooks
|
|
|
|
hasBlockHook func(common.Hash, uint64, bool) bool // Used to determine whether the server has the specified block.
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
func newServerPeer(version int, network uint64, trusted bool, p *p2p.Peer, rw p2p.MsgReadWriter) *serverPeer {
|
|
|
|
return &serverPeer{
|
|
|
|
peerCommons: peerCommons{
|
|
|
|
Peer: p,
|
|
|
|
rw: rw,
|
2020-07-28 18:02:35 +03:00
|
|
|
id: p.ID().String(),
|
2020-02-26 12:41:24 +03:00
|
|
|
version: version,
|
|
|
|
network: network,
|
2020-03-31 18:17:24 +03:00
|
|
|
sendQueue: utils.NewExecQueue(100),
|
2020-02-26 12:41:24 +03:00
|
|
|
closeCh: make(chan struct{}),
|
|
|
|
},
|
2020-07-28 18:02:35 +03:00
|
|
|
trusted: trusted,
|
|
|
|
errCount: utils.LinearExpiredValue{Rate: mclock.AbsTime(time.Hour)},
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
2019-08-21 12:29:34 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// rejectUpdate returns true if a parameter update has to be rejected because
|
|
|
|
// the size and/or rate of updates exceed the capacity limitation
|
|
|
|
func (p *serverPeer) rejectUpdate(size uint64) bool {
|
|
|
|
now := mclock.Now()
|
|
|
|
if p.updateCount == 0 {
|
|
|
|
p.updateTime = now
|
|
|
|
} else {
|
|
|
|
dt := now - p.updateTime
|
|
|
|
p.updateTime = now
|
|
|
|
|
|
|
|
r := uint64(dt / mclock.AbsTime(allowedUpdateRate))
|
|
|
|
if p.updateCount > r {
|
|
|
|
p.updateCount -= r
|
|
|
|
} else {
|
|
|
|
p.updateCount = 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
p.updateCount += size
|
|
|
|
return p.updateCount > allowedUpdateBytes
|
|
|
|
}
|
|
|
|
|
|
|
|
// freeze processes Stop messages from the given server and set the status as
|
|
|
|
// frozen.
|
|
|
|
func (p *serverPeer) freeze() {
|
|
|
|
if atomic.CompareAndSwapUint32(&p.frozen, 0, 1) {
|
2020-03-31 18:17:24 +03:00
|
|
|
p.sendQueue.Clear()
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// unfreeze processes Resume messages from the given server and set the status
|
|
|
|
// as unfrozen.
|
|
|
|
func (p *serverPeer) unfreeze() {
|
|
|
|
atomic.StoreUint32(&p.frozen, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
// sendRequest send a request to the server based on the given message type
|
|
|
|
// and content.
|
|
|
|
func sendRequest(w p2p.MsgWriter, msgcode, reqID uint64, data interface{}) error {
|
2016-10-14 06:51:29 +03:00
|
|
|
type req struct {
|
|
|
|
ReqID uint64
|
|
|
|
Data interface{}
|
|
|
|
}
|
|
|
|
return p2p.Send(w, msgcode, req{reqID, data})
|
|
|
|
}
|
|
|
|
|
2020-04-09 12:55:32 +03:00
|
|
|
func (p *serverPeer) sendRequest(msgcode, reqID uint64, data interface{}, amount int) error {
|
|
|
|
p.sentRequest(reqID, uint32(msgcode), uint32(amount))
|
|
|
|
return sendRequest(p.rw, msgcode, reqID, data)
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// requestHeadersByHash fetches a batch of blocks' headers corresponding to the
|
|
|
|
// specified header query, based on the hash of an origin block.
|
|
|
|
func (p *serverPeer) requestHeadersByHash(reqID uint64, origin common.Hash, amount int, skip int, reverse bool) error {
|
|
|
|
p.Log().Debug("Fetching batch of headers", "count", amount, "fromhash", origin, "skip", skip, "reverse", reverse)
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetBlockHeadersMsg, reqID, &getBlockHeadersData{Origin: hashOrNumber{Hash: origin}, Amount: uint64(amount), Skip: uint64(skip), Reverse: reverse}, amount)
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// requestHeadersByNumber fetches a batch of blocks' headers corresponding to the
|
|
|
|
// specified header query, based on the number of an origin block.
|
|
|
|
func (p *serverPeer) requestHeadersByNumber(reqID, origin uint64, amount int, skip int, reverse bool) error {
|
|
|
|
p.Log().Debug("Fetching batch of headers", "count", amount, "fromnum", origin, "skip", skip, "reverse", reverse)
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetBlockHeadersMsg, reqID, &getBlockHeadersData{Origin: hashOrNumber{Number: origin}, Amount: uint64(amount), Skip: uint64(skip), Reverse: reverse}, amount)
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// requestBodies fetches a batch of blocks' bodies corresponding to the hashes
|
|
|
|
// specified.
|
|
|
|
func (p *serverPeer) requestBodies(reqID uint64, hashes []common.Hash) error {
|
|
|
|
p.Log().Debug("Fetching batch of block bodies", "count", len(hashes))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetBlockBodiesMsg, reqID, hashes, len(hashes))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// requestCode fetches a batch of arbitrary data from a node's known state
|
|
|
|
// data, corresponding to the specified hashes.
|
|
|
|
func (p *serverPeer) requestCode(reqID uint64, reqs []CodeReq) error {
|
|
|
|
p.Log().Debug("Fetching batch of codes", "count", len(reqs))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetCodeMsg, reqID, reqs, len(reqs))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// requestReceipts fetches a batch of transaction receipts from a remote node.
|
|
|
|
func (p *serverPeer) requestReceipts(reqID uint64, hashes []common.Hash) error {
|
|
|
|
p.Log().Debug("Fetching batch of receipts", "count", len(hashes))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetReceiptsMsg, reqID, hashes, len(hashes))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// requestProofs fetches a batch of merkle proofs from a remote node.
|
|
|
|
func (p *serverPeer) requestProofs(reqID uint64, reqs []ProofReq) error {
|
|
|
|
p.Log().Debug("Fetching batch of proofs", "count", len(reqs))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetProofsV2Msg, reqID, reqs, len(reqs))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// requestHelperTrieProofs fetches a batch of HelperTrie merkle proofs from a remote node.
|
|
|
|
func (p *serverPeer) requestHelperTrieProofs(reqID uint64, reqs []HelperTrieReq) error {
|
|
|
|
p.Log().Debug("Fetching batch of HelperTrie proofs", "count", len(reqs))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetHelperTrieProofsMsg, reqID, reqs, len(reqs))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// requestTxStatus fetches a batch of transaction status records from a remote node.
|
|
|
|
func (p *serverPeer) requestTxStatus(reqID uint64, txHashes []common.Hash) error {
|
|
|
|
p.Log().Debug("Requesting transaction status", "count", len(txHashes))
|
2020-04-09 12:55:32 +03:00
|
|
|
return p.sendRequest(GetTxStatusMsg, reqID, txHashes, len(txHashes))
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
2020-09-14 23:44:20 +03:00
|
|
|
// sendTxs creates a reply with a batch of transactions to be added to the remote transaction pool.
|
2020-04-09 12:55:32 +03:00
|
|
|
func (p *serverPeer) sendTxs(reqID uint64, amount int, txs rlp.RawValue) error {
|
|
|
|
p.Log().Debug("Sending batch of transactions", "amount", amount, "size", len(txs))
|
|
|
|
sizeFactor := (len(txs) + txSizeCostLimit/2) / txSizeCostLimit
|
|
|
|
if sizeFactor > amount {
|
|
|
|
amount = sizeFactor
|
|
|
|
}
|
|
|
|
return p.sendRequest(SendTxV2Msg, reqID, txs, amount)
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// waitBefore implements distPeer interface
|
|
|
|
func (p *serverPeer) waitBefore(maxCost uint64) (time.Duration, float64) {
|
|
|
|
return p.fcServer.CanSend(maxCost)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// getRequestCost returns an estimated request cost according to the flow control
|
|
|
|
// rules negotiated between the server and the client.
|
|
|
|
func (p *serverPeer) getRequestCost(msgcode uint64, amount int) uint64 {
|
2016-12-10 08:50:36 +03:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
|
2019-04-16 14:30:47 +03:00
|
|
|
costs := p.fcCosts[msgcode]
|
|
|
|
if costs == nil {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
cost := costs.baseCost + costs.reqCost*uint64(amount)
|
2019-02-26 14:32:48 +03:00
|
|
|
if cost > p.fcParams.BufLimit {
|
|
|
|
cost = p.fcParams.BufLimit
|
|
|
|
}
|
|
|
|
return cost
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// getTxRelayCost returns an estimated relay cost according to the flow control
|
|
|
|
// rules negotiated between the server and the client.
|
|
|
|
func (p *serverPeer) getTxRelayCost(amount, size int) uint64 {
|
2019-02-26 14:32:48 +03:00
|
|
|
p.lock.RLock()
|
|
|
|
defer p.lock.RUnlock()
|
|
|
|
|
2019-04-16 14:30:47 +03:00
|
|
|
costs := p.fcCosts[SendTxV2Msg]
|
|
|
|
if costs == nil {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
cost := costs.baseCost + costs.reqCost*uint64(amount)
|
|
|
|
sizeCost := costs.baseCost + costs.reqCost*uint64(size)/txSizeCostLimit
|
2019-02-26 14:32:48 +03:00
|
|
|
if sizeCost > cost {
|
|
|
|
cost = sizeCost
|
|
|
|
}
|
|
|
|
if cost > p.fcParams.BufLimit {
|
|
|
|
cost = p.fcParams.BufLimit
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
return cost
|
|
|
|
}
|
|
|
|
|
2016-12-10 08:50:36 +03:00
|
|
|
// HasBlock checks if the peer has a given block
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *serverPeer) HasBlock(hash common.Hash, number uint64, hasState bool) bool {
|
2016-12-10 08:50:36 +03:00
|
|
|
p.lock.RLock()
|
2020-07-28 18:02:35 +03:00
|
|
|
defer p.lock.RUnlock()
|
2020-04-09 12:55:32 +03:00
|
|
|
|
2020-07-28 18:02:35 +03:00
|
|
|
if p.hasBlockHook != nil {
|
|
|
|
return p.hasBlockHook(hash, number, hasState)
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
head := p.headInfo.Number
|
|
|
|
var since, recent uint64
|
2019-05-30 21:51:13 +03:00
|
|
|
if hasState {
|
|
|
|
since = p.stateSince
|
|
|
|
recent = p.stateRecent
|
|
|
|
} else {
|
|
|
|
since = p.chainSince
|
|
|
|
recent = p.chainRecent
|
|
|
|
}
|
2020-07-28 18:02:35 +03:00
|
|
|
return head >= number && number >= since && (recent == 0 || number+recent+4 > head)
|
2016-12-10 08:50:36 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// updateFlowControl updates the flow control parameters belonging to the server
|
|
|
|
// node if the announced key/value set contains relevant fields
|
|
|
|
func (p *serverPeer) updateFlowControl(update keyValueMap) {
|
|
|
|
p.lock.Lock()
|
|
|
|
defer p.lock.Unlock()
|
|
|
|
|
|
|
|
// If any of the flow control params is nil, refuse to update.
|
|
|
|
var params flowcontrol.ServerParams
|
|
|
|
if update.get("flowControl/BL", ¶ms.BufLimit) == nil && update.get("flowControl/MRR", ¶ms.MinRecharge) == nil {
|
|
|
|
// todo can light client set a minimal acceptable flow control params?
|
|
|
|
p.fcParams = params
|
|
|
|
p.fcServer.UpdateParams(params)
|
|
|
|
}
|
|
|
|
var MRC RequestCostList
|
|
|
|
if update.get("flowControl/MRC", &MRC) == nil {
|
|
|
|
costUpdate := MRC.decode(ProtocolLengths[uint(p.version)])
|
|
|
|
for code, cost := range costUpdate {
|
|
|
|
p.fcCosts[code] = cost
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-28 18:02:35 +03:00
|
|
|
// updateHead updates the head information based on the announcement from
|
|
|
|
// the peer.
|
|
|
|
func (p *serverPeer) updateHead(hash common.Hash, number uint64, td *big.Int) {
|
|
|
|
p.lock.Lock()
|
|
|
|
defer p.lock.Unlock()
|
|
|
|
|
|
|
|
p.headInfo = blockInfo{Hash: hash, Number: number, Td: td}
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// Handshake executes the les protocol handshake, negotiating version number,
|
2020-10-21 11:56:33 +03:00
|
|
|
// network IDs and genesis blocks.
|
2020-12-10 19:20:55 +03:00
|
|
|
func (p *serverPeer) Handshake(genesis common.Hash, forkid forkid.ID, forkFilter forkid.Filter) error {
|
2020-10-21 11:56:33 +03:00
|
|
|
// Note: there is no need to share local head with a server but older servers still
|
|
|
|
// require these fields so we announce zero values.
|
2020-12-10 19:20:55 +03:00
|
|
|
return p.handshake(common.Big0, common.Hash{}, 0, genesis, forkid, forkFilter, func(lists *keyValueList) {
|
2020-02-26 12:41:24 +03:00
|
|
|
// Add some client-specific handshake fields
|
|
|
|
//
|
|
|
|
// Enable signed announcement randomly even the server is not trusted.
|
|
|
|
p.announceType = announceTypeSimple
|
|
|
|
if p.trusted {
|
|
|
|
p.announceType = announceTypeSigned
|
|
|
|
}
|
|
|
|
*lists = (*lists).add("announceType", p.announceType)
|
|
|
|
}, func(recv keyValueMap) error {
|
2020-10-21 11:56:33 +03:00
|
|
|
var (
|
|
|
|
rHash common.Hash
|
|
|
|
rNum uint64
|
|
|
|
rTd *big.Int
|
|
|
|
)
|
|
|
|
if err := recv.get("headTd", &rTd); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := recv.get("headHash", &rHash); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := recv.get("headNum", &rNum); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
p.headInfo = blockInfo{Hash: rHash, Number: rNum, Td: rTd}
|
2020-02-26 12:41:24 +03:00
|
|
|
if recv.get("serveChainSince", &p.chainSince) != nil {
|
|
|
|
p.onlyAnnounce = true
|
|
|
|
}
|
|
|
|
if recv.get("serveRecentChain", &p.chainRecent) != nil {
|
|
|
|
p.chainRecent = 0
|
|
|
|
}
|
|
|
|
if recv.get("serveStateSince", &p.stateSince) != nil {
|
|
|
|
p.onlyAnnounce = true
|
|
|
|
}
|
|
|
|
if recv.get("serveRecentState", &p.stateRecent) != nil {
|
|
|
|
p.stateRecent = 0
|
|
|
|
}
|
|
|
|
if recv.get("txRelay", nil) != nil {
|
|
|
|
p.onlyAnnounce = true
|
|
|
|
}
|
|
|
|
if p.onlyAnnounce && !p.trusted {
|
|
|
|
return errResp(ErrUselessPeer, "peer cannot serve requests")
|
|
|
|
}
|
|
|
|
// Parse flow control handshake packet.
|
|
|
|
var sParams flowcontrol.ServerParams
|
|
|
|
if err := recv.get("flowControl/BL", &sParams.BufLimit); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := recv.get("flowControl/MRR", &sParams.MinRecharge); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
var MRC RequestCostList
|
|
|
|
if err := recv.get("flowControl/MRC", &MRC); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
p.fcParams = sParams
|
|
|
|
p.fcServer = flowcontrol.NewServerNode(sParams, &mclock.System{})
|
|
|
|
p.fcCosts = MRC.decode(ProtocolLengths[uint(p.version)])
|
|
|
|
|
|
|
|
recv.get("checkpoint/value", &p.checkpoint)
|
|
|
|
recv.get("checkpoint/registerHeight", &p.checkpointNumber)
|
|
|
|
|
|
|
|
if !p.onlyAnnounce {
|
|
|
|
for msgCode := range reqAvgTimeCost {
|
|
|
|
if p.fcCosts[msgCode] == nil {
|
|
|
|
return errResp(ErrUselessPeer, "peer does not support message %d", msgCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-04-09 12:55:32 +03:00
|
|
|
// setValueTracker sets the value tracker references for connected servers. Note that the
|
|
|
|
// references should be removed upon disconnection by setValueTracker(nil, nil).
|
|
|
|
func (p *serverPeer) setValueTracker(vt *lpc.ValueTracker, nvt *lpc.NodeValueTracker) {
|
|
|
|
p.vtLock.Lock()
|
|
|
|
p.valueTracker = vt
|
|
|
|
p.nodeValueTracker = nvt
|
|
|
|
if nvt != nil {
|
|
|
|
p.sentReqs = make(map[uint64]sentReqEntry)
|
|
|
|
} else {
|
|
|
|
p.sentReqs = nil
|
|
|
|
}
|
|
|
|
p.vtLock.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// updateVtParams updates the server's price table in the value tracker.
|
|
|
|
func (p *serverPeer) updateVtParams() {
|
|
|
|
p.vtLock.Lock()
|
|
|
|
defer p.vtLock.Unlock()
|
|
|
|
|
|
|
|
if p.nodeValueTracker == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
reqCosts := make([]uint64, len(requestList))
|
|
|
|
for code, costs := range p.fcCosts {
|
|
|
|
if m, ok := requestMapping[uint32(code)]; ok {
|
|
|
|
reqCosts[m.first] = costs.baseCost + costs.reqCost
|
|
|
|
if m.rest != -1 {
|
|
|
|
reqCosts[m.rest] = costs.reqCost
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
p.valueTracker.UpdateCosts(p.nodeValueTracker, reqCosts)
|
|
|
|
}
|
|
|
|
|
|
|
|
// sentReqEntry remembers sent requests and their sending times
|
|
|
|
type sentReqEntry struct {
|
|
|
|
reqType, amount uint32
|
|
|
|
at mclock.AbsTime
|
|
|
|
}
|
|
|
|
|
|
|
|
// sentRequest marks a request sent at the current moment to this server.
|
|
|
|
func (p *serverPeer) sentRequest(id uint64, reqType, amount uint32) {
|
|
|
|
p.vtLock.Lock()
|
|
|
|
if p.sentReqs != nil {
|
|
|
|
p.sentReqs[id] = sentReqEntry{reqType, amount, mclock.Now()}
|
|
|
|
}
|
|
|
|
p.vtLock.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// answeredRequest marks a request answered at the current moment by this server.
|
|
|
|
func (p *serverPeer) answeredRequest(id uint64) {
|
|
|
|
p.vtLock.Lock()
|
|
|
|
if p.sentReqs == nil {
|
|
|
|
p.vtLock.Unlock()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
e, ok := p.sentReqs[id]
|
|
|
|
delete(p.sentReqs, id)
|
|
|
|
vt := p.valueTracker
|
|
|
|
nvt := p.nodeValueTracker
|
|
|
|
p.vtLock.Unlock()
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var (
|
|
|
|
vtReqs [2]lpc.ServedRequest
|
|
|
|
reqCount int
|
|
|
|
)
|
|
|
|
m := requestMapping[e.reqType]
|
|
|
|
if m.rest == -1 || e.amount <= 1 {
|
|
|
|
reqCount = 1
|
|
|
|
vtReqs[0] = lpc.ServedRequest{ReqType: uint32(m.first), Amount: e.amount}
|
|
|
|
} else {
|
|
|
|
reqCount = 2
|
|
|
|
vtReqs[0] = lpc.ServedRequest{ReqType: uint32(m.first), Amount: 1}
|
|
|
|
vtReqs[1] = lpc.ServedRequest{ReqType: uint32(m.rest), Amount: e.amount - 1}
|
|
|
|
}
|
|
|
|
dt := time.Duration(mclock.Now() - e.at)
|
|
|
|
vt.Served(nvt, vtReqs[:reqCount], dt)
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// clientPeer represents each node to which the les server is connected.
|
|
|
|
// The node here refers to the light client.
|
|
|
|
type clientPeer struct {
|
|
|
|
peerCommons
|
|
|
|
|
|
|
|
// responseLock ensures that responses are queued in the same order as
|
|
|
|
// RequestProcessed is called
|
2020-03-12 13:25:52 +03:00
|
|
|
responseLock sync.Mutex
|
|
|
|
responseCount uint64 // Counter to generate an unique id for request processing.
|
2020-07-28 18:02:35 +03:00
|
|
|
|
2020-09-14 23:44:20 +03:00
|
|
|
balance *lps.NodeBalance
|
|
|
|
|
2020-07-28 18:02:35 +03:00
|
|
|
// invalidLock is used for protecting invalidCount.
|
|
|
|
invalidLock sync.RWMutex
|
|
|
|
invalidCount utils.LinearExpiredValue // Counter the invalid request the client peer has made.
|
|
|
|
|
|
|
|
server bool
|
|
|
|
errCh chan error
|
|
|
|
fcClient *flowcontrol.ClientNode // Server side mirror token bucket.
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func newClientPeer(version int, network uint64, p *p2p.Peer, rw p2p.MsgReadWriter) *clientPeer {
|
|
|
|
return &clientPeer{
|
|
|
|
peerCommons: peerCommons{
|
|
|
|
Peer: p,
|
|
|
|
rw: rw,
|
2020-07-28 18:02:35 +03:00
|
|
|
id: p.ID().String(),
|
2020-02-26 12:41:24 +03:00
|
|
|
version: version,
|
|
|
|
network: network,
|
2020-03-31 18:17:24 +03:00
|
|
|
sendQueue: utils.NewExecQueue(100),
|
2020-02-26 12:41:24 +03:00
|
|
|
closeCh: make(chan struct{}),
|
|
|
|
},
|
2020-07-28 18:02:35 +03:00
|
|
|
invalidCount: utils.LinearExpiredValue{Rate: mclock.AbsTime(time.Hour)},
|
|
|
|
errCh: make(chan error, 1),
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// freeClientId returns a string identifier for the peer. Multiple peers with
|
|
|
|
// the same identifier can not be connected in free mode simultaneously.
|
|
|
|
func (p *clientPeer) freeClientId() string {
|
|
|
|
if addr, ok := p.RemoteAddr().(*net.TCPAddr); ok {
|
|
|
|
if addr.IP.IsLoopback() {
|
|
|
|
// using peer id instead of loopback ip address allows multiple free
|
|
|
|
// connections from local machine to own server
|
|
|
|
return p.id
|
|
|
|
} else {
|
|
|
|
return addr.IP.String()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return p.id
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// sendStop notifies the client about being in frozen state
|
|
|
|
func (p *clientPeer) sendStop() error {
|
2019-05-30 21:51:13 +03:00
|
|
|
return p2p.Send(p.rw, StopMsg, struct{}{})
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// sendResume notifies the client about getting out of frozen state
|
|
|
|
func (p *clientPeer) sendResume(bv uint64) error {
|
2019-05-30 21:51:13 +03:00
|
|
|
return p2p.Send(p.rw, ResumeMsg, bv)
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// freeze temporarily puts the client in a frozen state which means all unprocessed
|
|
|
|
// and subsequent requests are dropped. Unfreezing happens automatically after a short
|
|
|
|
// time if the client's buffer value is at least in the slightly positive region.
|
|
|
|
// The client is also notified about being frozen/unfrozen with a Stop/Resume message.
|
|
|
|
func (p *clientPeer) freeze() {
|
|
|
|
if p.version < lpv3 {
|
|
|
|
// if Stop/Resume is not supported then just drop the peer after setting
|
|
|
|
// its frozen status permanently
|
|
|
|
atomic.StoreUint32(&p.frozen, 1)
|
|
|
|
p.Peer.Disconnect(p2p.DiscUselessPeer)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if atomic.SwapUint32(&p.frozen, 1) == 0 {
|
|
|
|
go func() {
|
|
|
|
p.sendStop()
|
|
|
|
time.Sleep(freezeTimeBase + time.Duration(rand.Int63n(int64(freezeTimeRandom))))
|
|
|
|
for {
|
|
|
|
bufValue, bufLimit := p.fcClient.BufferStatus()
|
|
|
|
if bufLimit == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if bufValue <= bufLimit/8 {
|
|
|
|
time.Sleep(freezeCheckPeriod)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
atomic.StoreUint32(&p.frozen, 0)
|
|
|
|
p.sendResume(bufValue)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// reply struct represents a reply with the actual data already RLP encoded and
|
|
|
|
// only the bv (buffer value) missing. This allows the serving mechanism to
|
|
|
|
// calculate the bv value which depends on the data size before sending the reply.
|
|
|
|
type reply struct {
|
|
|
|
w p2p.MsgWriter
|
|
|
|
msgcode, reqID uint64
|
|
|
|
data rlp.RawValue
|
|
|
|
}
|
|
|
|
|
|
|
|
// send sends the reply with the calculated buffer value
|
|
|
|
func (r *reply) send(bv uint64) error {
|
|
|
|
type resp struct {
|
|
|
|
ReqID, BV uint64
|
|
|
|
Data rlp.RawValue
|
|
|
|
}
|
|
|
|
return p2p.Send(r.w, r.msgcode, resp{r.reqID, bv, r.data})
|
|
|
|
}
|
|
|
|
|
|
|
|
// size returns the RLP encoded size of the message data
|
|
|
|
func (r *reply) size() uint32 {
|
|
|
|
return uint32(len(r.data))
|
|
|
|
}
|
|
|
|
|
|
|
|
// replyBlockHeaders creates a reply with a batch of block headers
|
|
|
|
func (p *clientPeer) replyBlockHeaders(reqID uint64, headers []*types.Header) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(headers)
|
|
|
|
return &reply{p.rw, BlockHeadersMsg, reqID, data}
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyBlockBodiesRLP creates a reply with a batch of block contents from
|
2016-10-14 06:51:29 +03:00
|
|
|
// an already RLP encoded format.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *clientPeer) replyBlockBodiesRLP(reqID uint64, bodies []rlp.RawValue) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(bodies)
|
|
|
|
return &reply{p.rw, BlockBodiesMsg, reqID, data}
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyCode creates a reply with a batch of arbitrary internal data, corresponding to the
|
2016-10-14 06:51:29 +03:00
|
|
|
// hashes requested.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *clientPeer) replyCode(reqID uint64, codes [][]byte) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(codes)
|
|
|
|
return &reply{p.rw, CodeMsg, reqID, data}
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyReceiptsRLP creates a reply with a batch of transaction receipts, corresponding to the
|
2016-10-14 06:51:29 +03:00
|
|
|
// ones requested from an already RLP encoded format.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (p *clientPeer) replyReceiptsRLP(reqID uint64, receipts []rlp.RawValue) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(receipts)
|
|
|
|
return &reply{p.rw, ReceiptsMsg, reqID, data}
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyProofsV2 creates a reply with a batch of merkle proofs, corresponding to the ones requested.
|
|
|
|
func (p *clientPeer) replyProofsV2(reqID uint64, proofs light.NodeList) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(proofs)
|
|
|
|
return &reply{p.rw, ProofsV2Msg, reqID, data}
|
2017-10-24 16:19:09 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyHelperTrieProofs creates a reply with a batch of HelperTrie proofs, corresponding to the ones requested.
|
|
|
|
func (p *clientPeer) replyHelperTrieProofs(reqID uint64, resp HelperTrieResps) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(resp)
|
|
|
|
return &reply{p.rw, HelperTrieProofsMsg, reqID, data}
|
2017-10-24 16:19:09 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// replyTxStatus creates a reply with a batch of transaction status records, corresponding to the ones requested.
|
|
|
|
func (p *clientPeer) replyTxStatus(reqID uint64, stats []light.TxStatus) *reply {
|
2019-02-26 14:32:48 +03:00
|
|
|
data, _ := rlp.EncodeToBytes(stats)
|
|
|
|
return &reply{p.rw, TxStatusMsg, reqID, data}
|
2017-10-24 16:19:09 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// sendAnnounce announces the availability of a number of blocks through
|
|
|
|
// a hash notification.
|
|
|
|
func (p *clientPeer) sendAnnounce(request announceData) error {
|
|
|
|
return p2p.Send(p.rw, AnnounceMsg, request)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-09-14 23:44:20 +03:00
|
|
|
// allowInactive implements clientPoolPeer
|
|
|
|
func (p *clientPeer) allowInactive() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// updateCapacity updates the request serving capacity assigned to a given client
|
|
|
|
// and also sends an announcement about the updated flow control parameters
|
|
|
|
func (p *clientPeer) updateCapacity(cap uint64) {
|
|
|
|
p.lock.Lock()
|
|
|
|
defer p.lock.Unlock()
|
|
|
|
|
2020-09-14 23:44:20 +03:00
|
|
|
if cap != p.fcParams.MinRecharge {
|
|
|
|
p.fcParams = flowcontrol.ServerParams{MinRecharge: cap, BufLimit: cap * bufLimitRatio}
|
|
|
|
p.fcClient.UpdateParams(p.fcParams)
|
|
|
|
var kvList keyValueList
|
|
|
|
kvList = kvList.add("flowControl/MRR", cap)
|
|
|
|
kvList = kvList.add("flowControl/BL", cap*bufLimitRatio)
|
|
|
|
p.queueSend(func() { p.sendAnnounce(announceData{Update: kvList}) })
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// freezeClient temporarily puts the client in a frozen state which means all
|
|
|
|
// unprocessed and subsequent requests are dropped. Unfreezing happens automatically
|
|
|
|
// after a short time if the client's buffer value is at least in the slightly positive
|
|
|
|
// region. The client is also notified about being frozen/unfrozen with a Stop/Resume
|
|
|
|
// message.
|
|
|
|
func (p *clientPeer) freezeClient() {
|
|
|
|
if p.version < lpv3 {
|
|
|
|
// if Stop/Resume is not supported then just drop the peer after setting
|
|
|
|
// its frozen status permanently
|
|
|
|
atomic.StoreUint32(&p.frozen, 1)
|
|
|
|
p.Peer.Disconnect(p2p.DiscUselessPeer)
|
|
|
|
return
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
if atomic.SwapUint32(&p.frozen, 1) == 0 {
|
|
|
|
go func() {
|
|
|
|
p.sendStop()
|
|
|
|
time.Sleep(freezeTimeBase + time.Duration(rand.Int63n(int64(freezeTimeRandom))))
|
|
|
|
for {
|
|
|
|
bufValue, bufLimit := p.fcClient.BufferStatus()
|
|
|
|
if bufLimit == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if bufValue <= bufLimit/8 {
|
|
|
|
time.Sleep(freezeCheckPeriod)
|
|
|
|
} else {
|
|
|
|
atomic.StoreUint32(&p.frozen, 0)
|
|
|
|
p.sendResume(bufValue)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handshake executes the les protocol handshake, negotiating version number,
|
|
|
|
// network IDs, difficulties, head and genesis blocks.
|
2020-12-10 19:20:55 +03:00
|
|
|
func (p *clientPeer) Handshake(td *big.Int, head common.Hash, headNum uint64, genesis common.Hash, forkID forkid.ID, forkFilter forkid.Filter, server *LesServer) error {
|
2020-10-21 11:56:33 +03:00
|
|
|
// Note: clientPeer.headInfo should contain the last head announced to the client by us.
|
|
|
|
// The values announced in the handshake are dummy values for compatibility reasons and should be ignored.
|
|
|
|
p.headInfo = blockInfo{Hash: head, Number: headNum, Td: td}
|
2020-12-10 19:20:55 +03:00
|
|
|
return p.handshake(td, head, headNum, genesis, forkID, forkFilter, func(lists *keyValueList) {
|
2019-08-21 12:29:34 +03:00
|
|
|
// Add some information which services server can offer.
|
|
|
|
if !server.config.UltraLightOnlyAnnounce {
|
2020-02-26 12:41:24 +03:00
|
|
|
*lists = (*lists).add("serveHeaders", nil)
|
|
|
|
*lists = (*lists).add("serveChainSince", uint64(0))
|
|
|
|
*lists = (*lists).add("serveStateSince", uint64(0))
|
2019-06-11 10:40:32 +03:00
|
|
|
|
|
|
|
// If local ethereum node is running in archive mode, advertise ourselves we have
|
|
|
|
// all version state data. Otherwise only recent state is available.
|
|
|
|
stateRecent := uint64(core.TriesInMemory - 4)
|
|
|
|
if server.archiveMode {
|
|
|
|
stateRecent = 0
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
*lists = (*lists).add("serveRecentState", stateRecent)
|
|
|
|
*lists = (*lists).add("txRelay", nil)
|
2019-01-24 14:18:26 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
*lists = (*lists).add("flowControl/BL", server.defParams.BufLimit)
|
|
|
|
*lists = (*lists).add("flowControl/MRR", server.defParams.MinRecharge)
|
2019-08-21 12:29:34 +03:00
|
|
|
|
2019-02-26 14:32:48 +03:00
|
|
|
var costList RequestCostList
|
2019-08-21 12:29:34 +03:00
|
|
|
if server.costTracker.testCostList != nil {
|
|
|
|
costList = server.costTracker.testCostList
|
2019-02-26 14:32:48 +03:00
|
|
|
} else {
|
2019-08-21 12:29:34 +03:00
|
|
|
costList = server.costTracker.makeCostList(server.costTracker.globalFactor())
|
2019-02-26 14:32:48 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
*lists = (*lists).add("flowControl/MRC", costList)
|
2019-05-13 14:26:47 +03:00
|
|
|
p.fcCosts = costList.decode(ProtocolLengths[uint(p.version)])
|
2019-02-26 14:32:48 +03:00
|
|
|
p.fcParams = server.defParams
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 10:34:02 +03:00
|
|
|
|
2019-08-21 12:29:34 +03:00
|
|
|
// Add advertised checkpoint and register block height which
|
|
|
|
// client can verify the checkpoint validity.
|
2020-01-07 12:24:21 +03:00
|
|
|
if server.oracle != nil && server.oracle.IsRunning() {
|
|
|
|
cp, height := server.oracle.StableCheckpoint()
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 10:34:02 +03:00
|
|
|
if cp != nil {
|
2020-02-26 12:41:24 +03:00
|
|
|
*lists = (*lists).add("checkpoint/value", cp)
|
|
|
|
*lists = (*lists).add("checkpoint/registerHeight", height)
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 10:34:02 +03:00
|
|
|
}
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
}, func(recv keyValueMap) error {
|
2019-12-25 04:06:00 +03:00
|
|
|
p.server = recv.get("flowControl/MRR", nil) == nil
|
|
|
|
if p.server {
|
|
|
|
p.announceType = announceTypeNone // connected to another server, send no messages
|
|
|
|
} else {
|
|
|
|
if recv.get("announceType", &p.announceType) != nil {
|
|
|
|
// set default announceType on server side
|
|
|
|
p.announceType = announceTypeSimple
|
|
|
|
}
|
2020-09-14 23:44:20 +03:00
|
|
|
p.fcClient = flowcontrol.NewClientNode(server.fcManager, p.fcParams)
|
2017-10-24 16:19:09 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
2019-01-24 14:18:26 +03:00
|
|
|
|
2020-07-28 18:02:35 +03:00
|
|
|
func (p *clientPeer) bumpInvalid() {
|
|
|
|
p.invalidLock.Lock()
|
|
|
|
p.invalidCount.Add(1, mclock.Now())
|
|
|
|
p.invalidLock.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *clientPeer) getInvalid() uint64 {
|
|
|
|
p.invalidLock.RLock()
|
|
|
|
defer p.invalidLock.RUnlock()
|
|
|
|
return p.invalidCount.Value(mclock.Now())
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// serverPeerSubscriber is an interface to notify services about added or
|
|
|
|
// removed server peers
|
|
|
|
type serverPeerSubscriber interface {
|
|
|
|
registerPeer(*serverPeer)
|
|
|
|
unregisterPeer(*serverPeer)
|
|
|
|
}
|
2019-01-24 14:18:26 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// serverPeerSet represents the set of active server peers currently
|
|
|
|
// participating in the Light Ethereum sub-protocol.
|
|
|
|
type serverPeerSet struct {
|
|
|
|
peers map[string]*serverPeer
|
|
|
|
// subscribers is a batch of subscribers and peerset will notify
|
|
|
|
// these subscribers when the peerset changes(new server peer is
|
|
|
|
// added or removed)
|
|
|
|
subscribers []serverPeerSubscriber
|
|
|
|
closed bool
|
|
|
|
lock sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// newServerPeerSet creates a new peer set to track the active server peers.
|
|
|
|
func newServerPeerSet() *serverPeerSet {
|
|
|
|
return &serverPeerSet{peers: make(map[string]*serverPeer)}
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// subscribe adds a service to be notified about added or removed
|
|
|
|
// peers and also register all active peers into the given service.
|
|
|
|
func (ps *serverPeerSet) subscribe(sub serverPeerSubscriber) {
|
2017-06-21 13:27:38 +03:00
|
|
|
ps.lock.Lock()
|
2020-02-26 12:41:24 +03:00
|
|
|
defer ps.lock.Unlock()
|
|
|
|
|
|
|
|
ps.subscribers = append(ps.subscribers, sub)
|
2017-06-21 13:27:38 +03:00
|
|
|
for _, p := range ps.peers {
|
2020-02-26 12:41:24 +03:00
|
|
|
sub.registerPeer(p)
|
2017-10-24 16:19:09 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
}
|
2017-10-24 16:19:09 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// unSubscribe removes the specified service from the subscriber pool.
|
|
|
|
func (ps *serverPeerSet) unSubscribe(sub serverPeerSubscriber) {
|
|
|
|
ps.lock.Lock()
|
|
|
|
defer ps.lock.Unlock()
|
|
|
|
|
|
|
|
for i, s := range ps.subscribers {
|
|
|
|
if s == sub {
|
|
|
|
ps.subscribers = append(ps.subscribers[:i], ps.subscribers[i+1:]...)
|
|
|
|
return
|
|
|
|
}
|
2017-06-21 13:27:38 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// register adds a new server peer into the set, or returns an error if the
|
2016-10-14 06:51:29 +03:00
|
|
|
// peer is already known.
|
2020-02-26 12:41:24 +03:00
|
|
|
func (ps *serverPeerSet) register(peer *serverPeer) error {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.Lock()
|
2020-02-26 12:41:24 +03:00
|
|
|
defer ps.lock.Unlock()
|
|
|
|
|
2016-10-14 06:51:29 +03:00
|
|
|
if ps.closed {
|
|
|
|
return errClosed
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
if _, exist := ps.peers[peer.id]; exist {
|
2016-10-14 06:51:29 +03:00
|
|
|
return errAlreadyRegistered
|
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
ps.peers[peer.id] = peer
|
|
|
|
for _, sub := range ps.subscribers {
|
|
|
|
sub.registerPeer(peer)
|
2017-06-21 13:27:38 +03:00
|
|
|
}
|
2016-10-14 06:51:29 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// unregister removes a remote peer from the active set, disabling any further
|
|
|
|
// actions to/from that particular entity. It also initiates disconnection at
|
|
|
|
// the networking layer.
|
|
|
|
func (ps *serverPeerSet) unregister(id string) error {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.Lock()
|
2020-02-26 12:41:24 +03:00
|
|
|
defer ps.lock.Unlock()
|
2019-01-24 14:18:26 +03:00
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
p, ok := ps.peers[id]
|
|
|
|
if !ok {
|
|
|
|
return errNotRegistered
|
|
|
|
}
|
|
|
|
delete(ps.peers, id)
|
|
|
|
for _, sub := range ps.subscribers {
|
|
|
|
sub.unregisterPeer(p)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
p.Peer.Disconnect(p2p.DiscRequested)
|
|
|
|
return nil
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// ids returns a list of all registered peer IDs
|
|
|
|
func (ps *serverPeerSet) ids() []string {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.RLock()
|
|
|
|
defer ps.lock.RUnlock()
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
var ids []string
|
2017-01-06 17:52:03 +03:00
|
|
|
for id := range ps.peers {
|
2020-02-26 12:41:24 +03:00
|
|
|
ids = append(ids, id)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
2020-02-26 12:41:24 +03:00
|
|
|
return ids
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// peer retrieves the registered peer with the given id.
|
|
|
|
func (ps *serverPeerSet) peer(id string) *serverPeer {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.RLock()
|
|
|
|
defer ps.lock.RUnlock()
|
|
|
|
|
|
|
|
return ps.peers[id]
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// len returns if the current number of peers in the set.
|
|
|
|
func (ps *serverPeerSet) len() int {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.RLock()
|
|
|
|
defer ps.lock.RUnlock()
|
|
|
|
|
|
|
|
return len(ps.peers)
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// bestPeer retrieves the known peer with the currently highest total difficulty.
|
|
|
|
// If the peerset is "client peer set", then nothing meaningful will return. The
|
|
|
|
// reason is client peer never send back their latest status to server.
|
|
|
|
func (ps *serverPeerSet) bestPeer() *serverPeer {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.RLock()
|
|
|
|
defer ps.lock.RUnlock()
|
|
|
|
|
|
|
|
var (
|
2020-02-26 12:41:24 +03:00
|
|
|
bestPeer *serverPeer
|
2016-10-14 06:51:29 +03:00
|
|
|
bestTd *big.Int
|
|
|
|
)
|
|
|
|
for _, p := range ps.peers {
|
2020-02-26 12:41:24 +03:00
|
|
|
if td := p.Td(); bestTd == nil || td.Cmp(bestTd) > 0 {
|
2016-10-14 06:51:29 +03:00
|
|
|
bestPeer, bestTd = p, td
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return bestPeer
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// allServerPeers returns all server peers in a list.
|
|
|
|
func (ps *serverPeerSet) allPeers() []*serverPeer {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.RLock()
|
|
|
|
defer ps.lock.RUnlock()
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
list := make([]*serverPeer, 0, len(ps.peers))
|
|
|
|
for _, p := range ps.peers {
|
|
|
|
list = append(list, p)
|
2016-10-14 06:51:29 +03:00
|
|
|
}
|
|
|
|
return list
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:41:24 +03:00
|
|
|
// close disconnects all peers. No new peers can be registered
|
|
|
|
// after close has returned.
|
|
|
|
func (ps *serverPeerSet) close() {
|
2016-10-14 06:51:29 +03:00
|
|
|
ps.lock.Lock()
|
|
|
|
defer ps.lock.Unlock()
|
|
|
|
|
|
|
|
for _, p := range ps.peers {
|
|
|
|
p.Disconnect(p2p.DiscQuitting)
|
|
|
|
}
|
|
|
|
ps.closed = true
|
|
|
|
}
|