2015-07-07 03:54:22 +03:00
|
|
|
// Copyright 2014 The go-ethereum Authors
|
2015-07-22 19:48:40 +03:00
|
|
|
// This file is part of the go-ethereum library.
|
2015-07-07 03:54:22 +03:00
|
|
|
//
|
2015-07-23 19:35:11 +03:00
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
2015-07-07 03:54:22 +03:00
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
2015-07-22 19:48:40 +03:00
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
2015-07-07 03:54:22 +03:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-07-22 19:48:40 +03:00
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2015-07-07 03:54:22 +03:00
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
2015-07-22 19:48:40 +03:00
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
2015-07-07 03:54:22 +03:00
|
|
|
|
2014-10-23 18:57:54 +03:00
|
|
|
package p2p
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2014-11-21 22:48:49 +02:00
|
|
|
"io"
|
2014-10-23 18:57:54 +03:00
|
|
|
"net"
|
2014-11-21 22:48:49 +02:00
|
|
|
"sort"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2017-02-24 11:58:04 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common/mclock"
|
2017-09-25 11:08:07 +03:00
|
|
|
"github.com/ethereum/go-ethereum/event"
|
2017-02-22 15:10:07 +03:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2015-02-05 04:07:58 +02:00
|
|
|
"github.com/ethereum/go-ethereum/p2p/discover"
|
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
2014-10-23 18:57:54 +03:00
|
|
|
)
|
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
const (
|
2017-09-26 16:54:49 +03:00
|
|
|
baseProtocolVersion = 5
|
2015-02-05 04:07:58 +02:00
|
|
|
baseProtocolLength = uint64(16)
|
2015-05-18 02:14:35 +03:00
|
|
|
baseProtocolMaxMsgSize = 2 * 1024
|
2015-02-13 15:44:00 +02:00
|
|
|
|
2017-09-26 16:54:49 +03:00
|
|
|
snappyProtocolVersion = 5
|
|
|
|
|
2015-04-13 18:34:08 +03:00
|
|
|
pingInterval = 15 * time.Second
|
2015-02-05 04:07:58 +02:00
|
|
|
)
|
2014-11-21 22:48:49 +02:00
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
const (
|
|
|
|
// devp2p message codes
|
|
|
|
handshakeMsg = 0x00
|
|
|
|
discMsg = 0x01
|
|
|
|
pingMsg = 0x02
|
|
|
|
pongMsg = 0x03
|
|
|
|
)
|
2014-11-21 22:48:49 +02:00
|
|
|
|
2015-05-16 01:38:28 +03:00
|
|
|
// protoHandshake is the RLP structure of the protocol handshake.
|
|
|
|
type protoHandshake struct {
|
|
|
|
Version uint64
|
|
|
|
Name string
|
|
|
|
Caps []Cap
|
|
|
|
ListenPort uint64
|
|
|
|
ID discover.NodeID
|
2015-12-23 02:48:55 +02:00
|
|
|
|
|
|
|
// Ignore additional fields (for forward compatibility).
|
|
|
|
Rest []rlp.RawValue `rlp:"tail"`
|
2015-05-16 01:38:28 +03:00
|
|
|
}
|
|
|
|
|
2017-09-25 11:08:07 +03:00
|
|
|
// PeerEventType is the type of peer events emitted by a p2p.Server
|
|
|
|
type PeerEventType string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// PeerEventTypeAdd is the type of event emitted when a peer is added
|
|
|
|
// to a p2p.Server
|
|
|
|
PeerEventTypeAdd PeerEventType = "add"
|
|
|
|
|
|
|
|
// PeerEventTypeDrop is the type of event emitted when a peer is
|
|
|
|
// dropped from a p2p.Server
|
|
|
|
PeerEventTypeDrop PeerEventType = "drop"
|
|
|
|
|
|
|
|
// PeerEventTypeMsgSend is the type of event emitted when a
|
|
|
|
// message is successfully sent to a peer
|
|
|
|
PeerEventTypeMsgSend PeerEventType = "msgsend"
|
|
|
|
|
|
|
|
// PeerEventTypeMsgRecv is the type of event emitted when a
|
|
|
|
// message is received from a peer
|
|
|
|
PeerEventTypeMsgRecv PeerEventType = "msgrecv"
|
|
|
|
)
|
|
|
|
|
|
|
|
// PeerEvent is an event emitted when peers are either added or dropped from
|
|
|
|
// a p2p.Server or when a message is sent or received on a peer connection
|
|
|
|
type PeerEvent struct {
|
|
|
|
Type PeerEventType `json:"type"`
|
|
|
|
Peer discover.NodeID `json:"peer"`
|
|
|
|
Error string `json:"error,omitempty"`
|
|
|
|
Protocol string `json:"protocol,omitempty"`
|
|
|
|
MsgCode *uint64 `json:"msg_code,omitempty"`
|
|
|
|
MsgSize *uint32 `json:"msg_size,omitempty"`
|
|
|
|
}
|
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
// Peer represents a connected remote node.
|
2014-10-23 18:57:54 +03:00
|
|
|
type Peer struct {
|
2015-02-19 02:52:03 +02:00
|
|
|
rw *conn
|
|
|
|
running map[string]*protoRW
|
2017-02-24 11:58:04 +03:00
|
|
|
log log.Logger
|
|
|
|
created mclock.AbsTime
|
2014-11-21 22:48:49 +02:00
|
|
|
|
2015-04-08 18:37:11 +03:00
|
|
|
wg sync.WaitGroup
|
2014-11-21 22:48:49 +02:00
|
|
|
protoErr chan error
|
|
|
|
closed chan struct{}
|
|
|
|
disc chan DiscReason
|
2017-09-25 11:08:07 +03:00
|
|
|
|
|
|
|
// events receives message send / receive events if set
|
|
|
|
events *event.Feed
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewPeer returns a peer for testing purposes.
|
2015-02-05 04:07:58 +02:00
|
|
|
func NewPeer(id discover.NodeID, name string, caps []Cap) *Peer {
|
2015-02-19 02:52:03 +02:00
|
|
|
pipe, _ := net.Pipe()
|
2015-05-16 01:38:28 +03:00
|
|
|
conn := &conn{fd: pipe, transport: nil, id: id, caps: caps, name: name}
|
|
|
|
peer := newPeer(conn, nil)
|
2015-02-05 04:07:58 +02:00
|
|
|
close(peer.closed) // ensures Disconnect doesn't block
|
2014-10-23 18:57:54 +03:00
|
|
|
return peer
|
|
|
|
}
|
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
// ID returns the node's public key.
|
|
|
|
func (p *Peer) ID() discover.NodeID {
|
2015-05-16 01:38:28 +03:00
|
|
|
return p.rw.id
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
// Name returns the node name that the remote node advertised.
|
|
|
|
func (p *Peer) Name() string {
|
2015-05-16 01:38:28 +03:00
|
|
|
return p.rw.name
|
2015-01-18 09:59:54 +02:00
|
|
|
}
|
|
|
|
|
2014-11-21 22:48:49 +02:00
|
|
|
// Caps returns the capabilities (supported subprotocols) of the remote peer.
|
|
|
|
func (p *Peer) Caps() []Cap {
|
2015-02-19 02:52:03 +02:00
|
|
|
// TODO: maybe return copy
|
2015-05-16 01:38:28 +03:00
|
|
|
return p.rw.caps
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoteAddr returns the remote address of the network connection.
|
|
|
|
func (p *Peer) RemoteAddr() net.Addr {
|
2015-05-16 01:38:28 +03:00
|
|
|
return p.rw.fd.RemoteAddr()
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// LocalAddr returns the local address of the network connection.
|
|
|
|
func (p *Peer) LocalAddr() net.Addr {
|
2015-05-16 01:38:28 +03:00
|
|
|
return p.rw.fd.LocalAddr()
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Disconnect terminates the peer connection with the given reason.
|
|
|
|
// It returns immediately and does not wait until the connection is closed.
|
|
|
|
func (p *Peer) Disconnect(reason DiscReason) {
|
|
|
|
select {
|
|
|
|
case p.disc <- reason:
|
|
|
|
case <-p.closed:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// String implements fmt.Stringer.
|
|
|
|
func (p *Peer) String() string {
|
2015-05-16 01:38:28 +03:00
|
|
|
return fmt.Sprintf("Peer %x %v", p.rw.id[:8], p.RemoteAddr())
|
2015-02-05 04:07:58 +02:00
|
|
|
}
|
|
|
|
|
2017-12-01 14:49:04 +03:00
|
|
|
// Inbound returns true if the peer is an inbound connection
|
|
|
|
func (p *Peer) Inbound() bool {
|
|
|
|
return p.rw.flags&inboundConn != 0
|
|
|
|
}
|
|
|
|
|
2015-05-16 01:38:28 +03:00
|
|
|
func newPeer(conn *conn, protocols []Protocol) *Peer {
|
|
|
|
protomap := matchProtocols(protocols, conn.caps, conn)
|
2015-02-19 02:52:03 +02:00
|
|
|
p := &Peer{
|
|
|
|
rw: conn,
|
2015-04-08 18:37:11 +03:00
|
|
|
running: protomap,
|
2017-02-24 11:58:04 +03:00
|
|
|
created: mclock.Now(),
|
2015-02-19 02:52:03 +02:00
|
|
|
disc: make(chan DiscReason),
|
2015-04-08 18:37:11 +03:00
|
|
|
protoErr: make(chan error, len(protomap)+1), // protocols + pingLoop
|
2015-02-19 02:52:03 +02:00
|
|
|
closed: make(chan struct{}),
|
2017-02-24 11:58:04 +03:00
|
|
|
log: log.New("id", conn.id, "conn", conn.flags),
|
2014-10-23 18:57:54 +03:00
|
|
|
}
|
2015-02-19 02:52:03 +02:00
|
|
|
return p
|
2015-02-05 04:07:58 +02:00
|
|
|
}
|
2014-11-21 22:48:49 +02:00
|
|
|
|
2017-02-24 11:58:04 +03:00
|
|
|
func (p *Peer) Log() log.Logger {
|
|
|
|
return p.log
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Peer) run() (remoteRequested bool, err error) {
|
2015-06-15 14:42:44 +03:00
|
|
|
var (
|
|
|
|
writeStart = make(chan struct{}, 1)
|
|
|
|
writeErr = make(chan error, 1)
|
|
|
|
readErr = make(chan error, 1)
|
2017-02-24 11:58:04 +03:00
|
|
|
reason DiscReason // sent to the peer
|
2015-06-15 14:42:44 +03:00
|
|
|
)
|
2015-04-08 18:37:11 +03:00
|
|
|
p.wg.Add(2)
|
|
|
|
go p.readLoop(readErr)
|
|
|
|
go p.pingLoop()
|
2015-02-05 04:07:58 +02:00
|
|
|
|
2015-06-15 14:42:44 +03:00
|
|
|
// Start all protocol handlers.
|
|
|
|
writeStart <- struct{}{}
|
|
|
|
p.startProtocols(writeStart, writeErr)
|
2015-02-19 17:53:52 +02:00
|
|
|
|
2015-02-07 01:13:22 +02:00
|
|
|
// Wait for an error or disconnect.
|
2015-06-15 14:42:44 +03:00
|
|
|
loop:
|
|
|
|
for {
|
|
|
|
select {
|
2017-02-24 11:58:04 +03:00
|
|
|
case err = <-writeErr:
|
2015-06-15 14:42:44 +03:00
|
|
|
// A write finished. Allow the next write to start if
|
|
|
|
// there was no error.
|
|
|
|
if err != nil {
|
|
|
|
reason = DiscNetworkError
|
|
|
|
break loop
|
|
|
|
}
|
|
|
|
writeStart <- struct{}{}
|
2017-02-24 11:58:04 +03:00
|
|
|
case err = <-readErr:
|
2015-06-15 14:42:44 +03:00
|
|
|
if r, ok := err.(DiscReason); ok {
|
2017-02-24 11:58:04 +03:00
|
|
|
remoteRequested = true
|
2015-06-15 14:42:44 +03:00
|
|
|
reason = r
|
|
|
|
} else {
|
|
|
|
reason = DiscNetworkError
|
|
|
|
}
|
|
|
|
break loop
|
2017-02-24 11:58:04 +03:00
|
|
|
case err = <-p.protoErr:
|
2015-06-15 14:42:44 +03:00
|
|
|
reason = discReasonForError(err)
|
|
|
|
break loop
|
2017-02-24 11:58:04 +03:00
|
|
|
case err = <-p.disc:
|
2015-06-15 14:42:44 +03:00
|
|
|
break loop
|
2015-02-19 17:53:52 +02:00
|
|
|
}
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
2015-06-15 14:42:44 +03:00
|
|
|
|
2015-04-08 18:37:11 +03:00
|
|
|
close(p.closed)
|
2015-05-16 01:38:28 +03:00
|
|
|
p.rw.close(reason)
|
2015-04-08 18:37:11 +03:00
|
|
|
p.wg.Wait()
|
2017-02-24 11:58:04 +03:00
|
|
|
return remoteRequested, err
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-04-08 18:37:11 +03:00
|
|
|
func (p *Peer) pingLoop() {
|
2017-09-04 10:24:52 +03:00
|
|
|
ping := time.NewTimer(pingInterval)
|
2015-04-08 18:37:11 +03:00
|
|
|
defer p.wg.Done()
|
|
|
|
defer ping.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ping.C:
|
|
|
|
if err := SendItems(p.rw, pingMsg); err != nil {
|
|
|
|
p.protoErr <- err
|
|
|
|
return
|
|
|
|
}
|
2017-09-04 10:24:52 +03:00
|
|
|
ping.Reset(pingInterval)
|
2015-04-08 18:37:11 +03:00
|
|
|
case <-p.closed:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Peer) readLoop(errc chan<- error) {
|
|
|
|
defer p.wg.Done()
|
2015-02-05 04:07:58 +02:00
|
|
|
for {
|
|
|
|
msg, err := p.rw.ReadMsg()
|
|
|
|
if err != nil {
|
2015-04-08 18:37:11 +03:00
|
|
|
errc <- err
|
|
|
|
return
|
2015-02-05 04:07:58 +02:00
|
|
|
}
|
2015-04-29 23:49:58 +03:00
|
|
|
msg.ReceivedAt = time.Now()
|
2015-02-05 04:07:58 +02:00
|
|
|
if err = p.handle(msg); err != nil {
|
2015-04-08 18:37:11 +03:00
|
|
|
errc <- err
|
|
|
|
return
|
2015-02-05 04:07:58 +02:00
|
|
|
}
|
|
|
|
}
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-02-05 04:07:58 +02:00
|
|
|
func (p *Peer) handle(msg Msg) error {
|
|
|
|
switch {
|
|
|
|
case msg.Code == pingMsg:
|
|
|
|
msg.Discard()
|
2015-03-19 16:11:02 +02:00
|
|
|
go SendItems(p.rw, pongMsg)
|
2015-02-05 04:07:58 +02:00
|
|
|
case msg.Code == discMsg:
|
2015-03-04 13:03:43 +02:00
|
|
|
var reason [1]DiscReason
|
2015-04-08 18:37:11 +03:00
|
|
|
// This is the last message. We don't need to discard or
|
|
|
|
// check errors because, the connection will be closed after it.
|
2015-02-05 04:07:58 +02:00
|
|
|
rlp.Decode(msg.Payload, &reason)
|
2015-05-14 04:04:04 +03:00
|
|
|
return reason[0]
|
2015-02-05 04:07:58 +02:00
|
|
|
case msg.Code < baseProtocolLength:
|
|
|
|
// ignore other base protocol messages
|
|
|
|
return msg.Discard()
|
|
|
|
default:
|
|
|
|
// it's a subprotocol message
|
|
|
|
proto, err := p.getProto(msg.Code)
|
2014-11-21 22:48:49 +02:00
|
|
|
if err != nil {
|
2015-02-05 04:07:58 +02:00
|
|
|
return fmt.Errorf("msg code out of range: %v", msg.Code)
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
2015-04-08 18:37:11 +03:00
|
|
|
select {
|
|
|
|
case proto.in <- msg:
|
|
|
|
return nil
|
|
|
|
case <-p.closed:
|
|
|
|
return io.EOF
|
|
|
|
}
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
2015-02-05 04:07:58 +02:00
|
|
|
return nil
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-05-08 17:09:38 +03:00
|
|
|
func countMatchingProtocols(protocols []Protocol, caps []Cap) int {
|
|
|
|
n := 0
|
|
|
|
for _, cap := range caps {
|
|
|
|
for _, proto := range protocols {
|
|
|
|
if proto.Name == cap.Name && proto.Version == cap.Version {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
2015-02-19 02:52:03 +02:00
|
|
|
// matchProtocols creates structures for matching named subprotocols.
|
|
|
|
func matchProtocols(protocols []Protocol, caps []Cap, rw MsgReadWriter) map[string]*protoRW {
|
2015-06-26 15:48:50 +03:00
|
|
|
sort.Sort(capsByNameAndVersion(caps))
|
2014-11-21 22:48:49 +02:00
|
|
|
offset := baseProtocolLength
|
2015-02-19 02:52:03 +02:00
|
|
|
result := make(map[string]*protoRW)
|
2015-06-26 15:48:50 +03:00
|
|
|
|
2014-11-21 22:48:49 +02:00
|
|
|
outer:
|
|
|
|
for _, cap := range caps {
|
2015-02-19 02:52:03 +02:00
|
|
|
for _, proto := range protocols {
|
2015-06-26 15:48:50 +03:00
|
|
|
if proto.Name == cap.Name && proto.Version == cap.Version {
|
|
|
|
// If an old protocol version matched, revert it
|
|
|
|
if old := result[cap.Name]; old != nil {
|
|
|
|
offset -= old.Length
|
|
|
|
}
|
|
|
|
// Assign the new match
|
2015-02-19 02:52:03 +02:00
|
|
|
result[cap.Name] = &protoRW{Protocol: proto, offset: offset, in: make(chan Msg), w: rw}
|
2014-11-21 22:48:49 +02:00
|
|
|
offset += proto.Length
|
2015-06-26 15:48:50 +03:00
|
|
|
|
2014-11-21 22:48:49 +02:00
|
|
|
continue outer
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-02-19 02:52:03 +02:00
|
|
|
return result
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-06-15 14:42:44 +03:00
|
|
|
func (p *Peer) startProtocols(writeStart <-chan struct{}, writeErr chan<- error) {
|
2015-04-08 18:37:11 +03:00
|
|
|
p.wg.Add(len(p.running))
|
2015-02-19 02:52:03 +02:00
|
|
|
for _, proto := range p.running {
|
|
|
|
proto := proto
|
2015-04-08 18:37:11 +03:00
|
|
|
proto.closed = p.closed
|
2015-06-15 14:42:44 +03:00
|
|
|
proto.wstart = writeStart
|
|
|
|
proto.werr = writeErr
|
2017-09-25 11:08:07 +03:00
|
|
|
var rw MsgReadWriter = proto
|
|
|
|
if p.events != nil {
|
|
|
|
rw = newMsgEventer(rw, p.events, p.ID(), proto.Name)
|
|
|
|
}
|
2017-02-24 11:58:04 +03:00
|
|
|
p.log.Trace(fmt.Sprintf("Starting protocol %s/%d", proto.Name, proto.Version))
|
2015-02-19 02:52:03 +02:00
|
|
|
go func() {
|
2017-09-25 11:08:07 +03:00
|
|
|
err := proto.Run(p, rw)
|
2015-02-19 02:52:03 +02:00
|
|
|
if err == nil {
|
2017-02-24 11:58:04 +03:00
|
|
|
p.log.Trace(fmt.Sprintf("Protocol %s/%d returned", proto.Name, proto.Version))
|
|
|
|
err = errProtocolReturned
|
2015-05-07 00:19:14 +03:00
|
|
|
} else if err != io.EOF {
|
2017-02-24 11:58:04 +03:00
|
|
|
p.log.Trace(fmt.Sprintf("Protocol %s/%d failed", proto.Name, proto.Version), "err", err)
|
2015-02-19 02:52:03 +02:00
|
|
|
}
|
2015-04-08 18:37:11 +03:00
|
|
|
p.protoErr <- err
|
|
|
|
p.wg.Done()
|
2015-02-19 02:52:03 +02:00
|
|
|
}()
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// getProto finds the protocol responsible for handling
|
|
|
|
// the given message code.
|
2015-02-19 02:52:03 +02:00
|
|
|
func (p *Peer) getProto(code uint64) (*protoRW, error) {
|
2014-11-21 22:48:49 +02:00
|
|
|
for _, proto := range p.running {
|
2015-02-19 02:52:03 +02:00
|
|
|
if code >= proto.offset && code < proto.offset+proto.Length {
|
2014-11-21 22:48:49 +02:00
|
|
|
return proto, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, newPeerError(errInvalidMsgCode, "%d", code)
|
|
|
|
}
|
|
|
|
|
2015-02-19 02:52:03 +02:00
|
|
|
type protoRW struct {
|
|
|
|
Protocol
|
2015-06-15 14:42:44 +03:00
|
|
|
in chan Msg // receices read messages
|
|
|
|
closed <-chan struct{} // receives when peer is shutting down
|
|
|
|
wstart <-chan struct{} // receives when write may start
|
|
|
|
werr chan<- error // for write results
|
2015-02-19 02:52:03 +02:00
|
|
|
offset uint64
|
|
|
|
w MsgWriter
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
|
|
|
|
2015-06-15 14:42:44 +03:00
|
|
|
func (rw *protoRW) WriteMsg(msg Msg) (err error) {
|
2015-02-19 02:52:03 +02:00
|
|
|
if msg.Code >= rw.Length {
|
2014-11-21 22:48:49 +02:00
|
|
|
return newPeerError(errInvalidMsgCode, "not handled")
|
|
|
|
}
|
|
|
|
msg.Code += rw.offset
|
2015-06-15 14:42:44 +03:00
|
|
|
select {
|
|
|
|
case <-rw.wstart:
|
|
|
|
err = rw.w.WriteMsg(msg)
|
|
|
|
// Report write status back to Peer.run. It will initiate
|
|
|
|
// shutdown if the error is non-nil and unblock the next write
|
|
|
|
// otherwise. The calling protocol code should exit for errors
|
|
|
|
// as well but we don't want to rely on that.
|
|
|
|
rw.werr <- err
|
|
|
|
case <-rw.closed:
|
|
|
|
err = fmt.Errorf("shutting down")
|
|
|
|
}
|
|
|
|
return err
|
2014-10-23 18:57:54 +03:00
|
|
|
}
|
|
|
|
|
2015-02-19 02:52:03 +02:00
|
|
|
func (rw *protoRW) ReadMsg() (Msg, error) {
|
2015-04-08 18:37:11 +03:00
|
|
|
select {
|
|
|
|
case msg := <-rw.in:
|
|
|
|
msg.Code -= rw.offset
|
|
|
|
return msg, nil
|
|
|
|
case <-rw.closed:
|
|
|
|
return Msg{}, io.EOF
|
2014-11-21 22:48:49 +02:00
|
|
|
}
|
2014-10-23 18:57:54 +03:00
|
|
|
}
|
2015-10-27 16:10:30 +03:00
|
|
|
|
|
|
|
// PeerInfo represents a short summary of the information known about a connected
|
|
|
|
// peer. Sub-protocol independent fields are contained and initialized here, with
|
|
|
|
// protocol specifics delegated to all connected sub-protocols.
|
|
|
|
type PeerInfo struct {
|
|
|
|
ID string `json:"id"` // Unique node identifier (also the encryption key)
|
|
|
|
Name string `json:"name"` // Name of the node, including client type, version, OS, custom data
|
|
|
|
Caps []string `json:"caps"` // Sum-protocols advertised by this particular peer
|
|
|
|
Network struct {
|
|
|
|
LocalAddress string `json:"localAddress"` // Local endpoint of the TCP data connection
|
|
|
|
RemoteAddress string `json:"remoteAddress"` // Remote endpoint of the TCP data connection
|
2018-02-12 15:36:09 +03:00
|
|
|
Inbound bool `json:"inbound"`
|
|
|
|
Trusted bool `json:"trusted"`
|
|
|
|
Static bool `json:"static"`
|
2015-10-27 16:10:30 +03:00
|
|
|
} `json:"network"`
|
|
|
|
Protocols map[string]interface{} `json:"protocols"` // Sub-protocol specific metadata fields
|
|
|
|
}
|
|
|
|
|
|
|
|
// Info gathers and returns a collection of metadata known about a peer.
|
|
|
|
func (p *Peer) Info() *PeerInfo {
|
|
|
|
// Gather the protocol capabilities
|
|
|
|
var caps []string
|
|
|
|
for _, cap := range p.Caps() {
|
|
|
|
caps = append(caps, cap.String())
|
|
|
|
}
|
|
|
|
// Assemble the generic peer metadata
|
|
|
|
info := &PeerInfo{
|
|
|
|
ID: p.ID().String(),
|
|
|
|
Name: p.Name(),
|
|
|
|
Caps: caps,
|
|
|
|
Protocols: make(map[string]interface{}),
|
|
|
|
}
|
|
|
|
info.Network.LocalAddress = p.LocalAddr().String()
|
|
|
|
info.Network.RemoteAddress = p.RemoteAddr().String()
|
2018-02-12 15:36:09 +03:00
|
|
|
info.Network.Inbound = p.rw.is(inboundConn)
|
|
|
|
info.Network.Trusted = p.rw.is(trustedConn)
|
|
|
|
info.Network.Static = p.rw.is(staticDialedConn)
|
2015-10-27 16:10:30 +03:00
|
|
|
|
|
|
|
// Gather all the running protocol infos
|
|
|
|
for _, proto := range p.running {
|
|
|
|
protoInfo := interface{}("unknown")
|
|
|
|
if query := proto.Protocol.PeerInfo; query != nil {
|
|
|
|
if metadata := query(p.ID()); metadata != nil {
|
|
|
|
protoInfo = metadata
|
|
|
|
} else {
|
|
|
|
protoInfo = "handshake"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
info.Protocols[proto.Name] = protoInfo
|
|
|
|
}
|
|
|
|
return info
|
|
|
|
}
|