2015-04-12 13:38:25 +03:00
|
|
|
package downloader
|
|
|
|
|
|
|
|
import (
|
2015-05-29 21:04:20 +03:00
|
|
|
"bytes"
|
2015-04-18 02:10:32 +03:00
|
|
|
"errors"
|
2015-05-15 13:14:46 +03:00
|
|
|
"math/rand"
|
2015-04-12 13:38:25 +03:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2015-05-28 13:06:10 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core"
|
2015-04-12 13:38:25 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
2015-05-15 01:43:00 +03:00
|
|
|
"github.com/ethereum/go-ethereum/event"
|
2015-04-12 13:38:25 +03:00
|
|
|
"github.com/ethereum/go-ethereum/logger"
|
|
|
|
"github.com/ethereum/go-ethereum/logger/glog"
|
2015-05-30 00:34:23 +03:00
|
|
|
"gopkg.in/fatih/set.v0"
|
2015-04-12 13:38:25 +03:00
|
|
|
)
|
|
|
|
|
2015-06-08 14:06:36 +03:00
|
|
|
var (
|
2015-05-21 18:16:04 +03:00
|
|
|
MinHashFetch = 512 // Minimum amount of hashes to not consider a peer stalling
|
|
|
|
MaxHashFetch = 2048 // Amount of hashes to be fetched per retrieval request
|
|
|
|
MaxBlockFetch = 128 // Amount of blocks to be fetched per retrieval request
|
|
|
|
|
2015-06-08 14:06:36 +03:00
|
|
|
hashTTL = 5 * time.Second // Time it takes for a hash request to time out
|
2015-05-29 19:47:00 +03:00
|
|
|
blockSoftTTL = 3 * time.Second // Request completion threshold for increasing or decreasing a peer's bandwidth
|
|
|
|
blockHardTTL = 3 * blockSoftTTL // Maximum time allowance before a block request is considered expired
|
|
|
|
crossCheckCycle = time.Second // Period after which to check for expired cross checks
|
2015-06-08 14:06:36 +03:00
|
|
|
|
|
|
|
maxBannedHashes = 4096 // Number of bannable hashes before phasing old ones out
|
2015-05-15 13:14:46 +03:00
|
|
|
)
|
2015-04-19 14:30:34 +03:00
|
|
|
|
2015-05-15 13:14:46 +03:00
|
|
|
var (
|
2015-05-21 08:07:58 +03:00
|
|
|
errLowTd = errors.New("peers TD is too low")
|
2015-05-15 11:58:37 +03:00
|
|
|
ErrBusy = errors.New("busy")
|
2015-05-21 08:07:58 +03:00
|
|
|
errUnknownPeer = errors.New("peer is unknown or unhealthy")
|
2015-05-15 11:58:37 +03:00
|
|
|
ErrBadPeer = errors.New("action from bad peer ignored")
|
2015-05-21 08:07:58 +03:00
|
|
|
ErrStallingPeer = errors.New("peer is stalling")
|
2015-06-08 14:46:31 +03:00
|
|
|
errBannedHead = errors.New("peer head hash already banned")
|
2015-05-15 11:58:37 +03:00
|
|
|
errNoPeers = errors.New("no peers to keep download active")
|
|
|
|
ErrPendingQueue = errors.New("pending items in queue")
|
|
|
|
ErrTimeout = errors.New("timeout")
|
2015-05-26 12:44:09 +03:00
|
|
|
ErrEmptyHashSet = errors.New("empty hash set by peer")
|
2015-05-15 11:58:37 +03:00
|
|
|
errPeersUnavailable = errors.New("no peers available or all peers tried for block download process")
|
|
|
|
errAlreadyInPool = errors.New("hash already in pool")
|
|
|
|
ErrInvalidChain = errors.New("retrieved hash chain is invalid")
|
2015-05-15 13:14:46 +03:00
|
|
|
ErrCrossCheckFailed = errors.New("block cross-check failed")
|
2015-05-15 11:58:37 +03:00
|
|
|
errCancelHashFetch = errors.New("hash fetching cancelled (requested)")
|
|
|
|
errCancelBlockFetch = errors.New("block downloading cancelled (requested)")
|
|
|
|
errNoSyncActive = errors.New("no sync active")
|
2015-04-18 02:10:32 +03:00
|
|
|
)
|
|
|
|
|
2015-04-12 13:38:25 +03:00
|
|
|
type hashCheckFn func(common.Hash) bool
|
2015-05-01 01:23:51 +03:00
|
|
|
type getBlockFn func(common.Hash) *types.Block
|
2015-04-29 15:00:24 +03:00
|
|
|
type chainInsertFn func(types.Blocks) (int, error)
|
2015-04-12 13:38:25 +03:00
|
|
|
type hashIterFn func() (common.Hash, error)
|
|
|
|
|
2015-04-19 22:45:58 +03:00
|
|
|
type blockPack struct {
|
|
|
|
peerId string
|
|
|
|
blocks []*types.Block
|
|
|
|
}
|
|
|
|
|
2015-05-03 17:09:10 +03:00
|
|
|
type hashPack struct {
|
|
|
|
peerId string
|
|
|
|
hashes []common.Hash
|
|
|
|
}
|
|
|
|
|
2015-05-21 08:37:27 +03:00
|
|
|
type crossCheck struct {
|
|
|
|
expire time.Time
|
|
|
|
parent common.Hash
|
|
|
|
}
|
|
|
|
|
2015-04-12 13:38:25 +03:00
|
|
|
type Downloader struct {
|
2015-05-15 01:43:00 +03:00
|
|
|
mux *event.TypeMux
|
|
|
|
|
2015-05-21 08:37:27 +03:00
|
|
|
queue *queue // Scheduler for selecting the hashes to download
|
|
|
|
peers *peerSet // Set of active peers from which download can proceed
|
|
|
|
checks map[common.Hash]*crossCheck // Pending cross checks to verify a hash chain
|
2015-06-08 14:46:31 +03:00
|
|
|
banned *set.Set // Set of hashes we've received and banned
|
2015-04-12 13:38:25 +03:00
|
|
|
|
2015-04-13 17:38:32 +03:00
|
|
|
// Callbacks
|
2015-05-01 01:23:51 +03:00
|
|
|
hasBlock hashCheckFn
|
|
|
|
getBlock getBlockFn
|
2015-04-12 13:38:25 +03:00
|
|
|
|
2015-04-13 17:38:32 +03:00
|
|
|
// Status
|
2015-05-08 15:22:48 +03:00
|
|
|
synchronising int32
|
2015-05-13 16:03:05 +03:00
|
|
|
notified int32
|
2015-04-13 17:38:32 +03:00
|
|
|
|
|
|
|
// Channels
|
|
|
|
newPeerCh chan *peer
|
2015-05-03 17:09:10 +03:00
|
|
|
hashCh chan hashPack
|
2015-04-13 17:38:32 +03:00
|
|
|
blockCh chan blockPack
|
2015-05-13 13:47:21 +03:00
|
|
|
|
|
|
|
cancelCh chan struct{} // Channel to cancel mid-flight syncs
|
|
|
|
cancelLock sync.RWMutex // Lock to protect the cancel channel in delivers
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
|
|
|
|
2015-05-26 14:00:21 +03:00
|
|
|
// Block is an origin-tagged blockchain block.
|
|
|
|
type Block struct {
|
|
|
|
RawBlock *types.Block
|
|
|
|
OriginPeer string
|
|
|
|
}
|
|
|
|
|
2015-05-15 01:43:00 +03:00
|
|
|
func New(mux *event.TypeMux, hasBlock hashCheckFn, getBlock getBlockFn) *Downloader {
|
2015-05-28 13:06:10 +03:00
|
|
|
// Create the base downloader
|
2015-04-12 13:38:25 +03:00
|
|
|
downloader := &Downloader{
|
2015-05-15 01:43:00 +03:00
|
|
|
mux: mux,
|
2015-05-06 15:32:53 +03:00
|
|
|
queue: newQueue(),
|
2015-05-11 14:26:20 +03:00
|
|
|
peers: newPeerSet(),
|
2015-05-01 01:23:51 +03:00
|
|
|
hasBlock: hasBlock,
|
|
|
|
getBlock: getBlock,
|
|
|
|
newPeerCh: make(chan *peer, 1),
|
2015-05-03 17:09:10 +03:00
|
|
|
hashCh: make(chan hashPack, 1),
|
2015-05-01 01:23:51 +03:00
|
|
|
blockCh: make(chan blockPack, 1),
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
2015-05-28 13:06:10 +03:00
|
|
|
// Inject all the known bad hashes
|
2015-06-08 14:46:31 +03:00
|
|
|
downloader.banned = set.New()
|
2015-05-28 13:06:10 +03:00
|
|
|
for hash, _ := range core.BadHashes {
|
|
|
|
downloader.banned.Add(hash)
|
|
|
|
}
|
2015-04-12 13:38:25 +03:00
|
|
|
return downloader
|
|
|
|
}
|
|
|
|
|
2015-04-19 22:45:58 +03:00
|
|
|
func (d *Downloader) Stats() (current int, max int) {
|
2015-05-06 15:32:53 +03:00
|
|
|
return d.queue.Size()
|
2015-04-19 22:45:58 +03:00
|
|
|
}
|
|
|
|
|
2015-05-15 01:43:00 +03:00
|
|
|
// Synchronising returns the state of the downloader
|
|
|
|
func (d *Downloader) Synchronising() bool {
|
|
|
|
return atomic.LoadInt32(&d.synchronising) > 0
|
|
|
|
}
|
|
|
|
|
2015-05-11 14:26:20 +03:00
|
|
|
// RegisterPeer injects a new download peer into the set of block source to be
|
|
|
|
// used for fetching hashes and blocks from.
|
|
|
|
func (d *Downloader) RegisterPeer(id string, head common.Hash, getHashes hashFetcherFn, getBlocks blockFetcherFn) error {
|
2015-06-08 14:46:31 +03:00
|
|
|
// If the peer wants to send a banned hash, reject
|
|
|
|
if d.banned.Has(head) {
|
|
|
|
glog.V(logger.Debug).Infoln("Register rejected, head hash banned:", id)
|
|
|
|
return errBannedHead
|
|
|
|
}
|
|
|
|
// Otherwise try to construct and register the peer
|
2015-05-11 14:26:20 +03:00
|
|
|
glog.V(logger.Detail).Infoln("Registering peer", id)
|
|
|
|
if err := d.peers.Register(newPeer(id, head, getHashes, getBlocks)); err != nil {
|
|
|
|
glog.V(logger.Error).Infoln("Register failed:", err)
|
|
|
|
return err
|
|
|
|
}
|
2015-04-12 13:38:25 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-11 14:26:20 +03:00
|
|
|
// UnregisterPeer remove a peer from the known list, preventing any action from
|
|
|
|
// the specified peer.
|
|
|
|
func (d *Downloader) UnregisterPeer(id string) error {
|
|
|
|
glog.V(logger.Detail).Infoln("Unregistering peer", id)
|
|
|
|
if err := d.peers.Unregister(id); err != nil {
|
|
|
|
glog.V(logger.Error).Infoln("Unregister failed:", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
|
|
|
|
2015-05-08 15:22:48 +03:00
|
|
|
// Synchronise will select the peer and use it for synchronising. If an empty string is given
|
2015-05-06 15:32:53 +03:00
|
|
|
// it will use the best peer possible and synchronize if it's TD is higher than our own. If any of the
|
2015-04-24 15:40:32 +03:00
|
|
|
// checks fail an error will be returned. This method is synchronous
|
2015-05-08 15:22:48 +03:00
|
|
|
func (d *Downloader) Synchronise(id string, hash common.Hash) error {
|
2015-05-07 21:07:20 +03:00
|
|
|
// Make sure only one goroutine is ever allowed past this point at once
|
2015-05-08 15:22:48 +03:00
|
|
|
if !atomic.CompareAndSwapInt32(&d.synchronising, 0, 1) {
|
|
|
|
return ErrBusy
|
2015-04-19 14:30:34 +03:00
|
|
|
}
|
2015-05-08 15:22:48 +03:00
|
|
|
defer atomic.StoreInt32(&d.synchronising, 0)
|
2015-04-24 15:40:32 +03:00
|
|
|
|
2015-05-29 21:15:28 +03:00
|
|
|
// If the head hash is banned, terminate immediately
|
|
|
|
if d.banned.Has(hash) {
|
|
|
|
return ErrInvalidChain
|
|
|
|
}
|
2015-05-13 16:03:05 +03:00
|
|
|
// Post a user notification of the sync (only once per session)
|
|
|
|
if atomic.CompareAndSwapInt32(&d.notified, 0, 1) {
|
|
|
|
glog.V(logger.Info).Infoln("Block synchronisation started")
|
|
|
|
}
|
2015-05-15 01:43:00 +03:00
|
|
|
|
2015-05-13 13:47:21 +03:00
|
|
|
// Create cancel channel for aborting mid-flight
|
|
|
|
d.cancelLock.Lock()
|
2015-05-10 01:34:07 +03:00
|
|
|
d.cancelCh = make(chan struct{})
|
2015-05-13 13:47:21 +03:00
|
|
|
d.cancelLock.Unlock()
|
2015-05-10 01:34:07 +03:00
|
|
|
|
2015-05-07 21:07:20 +03:00
|
|
|
// Abort if the queue still contains some leftover data
|
2015-05-08 17:21:11 +03:00
|
|
|
if _, cached := d.queue.Size(); cached > 0 && d.queue.GetHeadBlock() != nil {
|
2015-05-11 18:27:34 +03:00
|
|
|
return ErrPendingQueue
|
2015-05-01 01:23:51 +03:00
|
|
|
}
|
2015-05-11 14:26:20 +03:00
|
|
|
// Reset the queue and peer set to clean any internal leftover state
|
2015-05-08 17:21:11 +03:00
|
|
|
d.queue.Reset()
|
2015-05-11 14:26:20 +03:00
|
|
|
d.peers.Reset()
|
2015-05-21 08:37:27 +03:00
|
|
|
d.checks = make(map[common.Hash]*crossCheck)
|
2015-05-08 17:21:11 +03:00
|
|
|
|
2015-05-07 21:07:20 +03:00
|
|
|
// Retrieve the origin peer and initiate the downloading process
|
2015-05-11 14:26:20 +03:00
|
|
|
p := d.peers.Peer(id)
|
2015-04-24 15:40:32 +03:00
|
|
|
if p == nil {
|
2015-04-24 16:37:32 +03:00
|
|
|
return errUnknownPeer
|
2015-04-13 17:38:32 +03:00
|
|
|
}
|
2015-05-16 13:29:19 +03:00
|
|
|
|
2015-05-11 14:26:20 +03:00
|
|
|
return d.syncWithPeer(p, hash)
|
2015-05-01 01:23:51 +03:00
|
|
|
}
|
|
|
|
|
2015-05-14 15:24:18 +03:00
|
|
|
// TakeBlocks takes blocks from the queue and yields them to the caller.
|
2015-05-26 14:00:21 +03:00
|
|
|
func (d *Downloader) TakeBlocks() []*Block {
|
2015-05-14 15:38:49 +03:00
|
|
|
return d.queue.TakeBlocks()
|
2015-04-13 17:38:32 +03:00
|
|
|
}
|
|
|
|
|
2015-06-08 14:46:31 +03:00
|
|
|
// Has checks if the downloader knows about a particular hash, meaning that its
|
|
|
|
// either already downloaded of pending retrieval.
|
2015-05-01 01:23:51 +03:00
|
|
|
func (d *Downloader) Has(hash common.Hash) bool {
|
2015-05-06 15:32:53 +03:00
|
|
|
return d.queue.Has(hash)
|
2015-05-01 01:23:51 +03:00
|
|
|
}
|
|
|
|
|
2015-05-11 14:26:20 +03:00
|
|
|
// syncWithPeer starts a block synchronization based on the hash chain from the
|
|
|
|
// specified peer and head hash.
|
|
|
|
func (d *Downloader) syncWithPeer(p *peer, hash common.Hash) (err error) {
|
2015-05-16 13:29:19 +03:00
|
|
|
d.mux.Post(StartEvent{})
|
2015-05-01 01:23:51 +03:00
|
|
|
defer func() {
|
|
|
|
// reset on error
|
|
|
|
if err != nil {
|
2015-05-15 14:48:57 +03:00
|
|
|
d.Cancel()
|
2015-05-15 01:43:00 +03:00
|
|
|
d.mux.Post(FailedEvent{err})
|
|
|
|
} else {
|
|
|
|
d.mux.Post(DoneEvent{})
|
2015-05-01 01:23:51 +03:00
|
|
|
}
|
|
|
|
}()
|
2015-04-24 15:40:32 +03:00
|
|
|
|
2015-05-07 21:07:20 +03:00
|
|
|
glog.V(logger.Debug).Infoln("Synchronizing with the network using:", p.id)
|
2015-05-11 14:26:20 +03:00
|
|
|
if err = d.fetchHashes(p, hash); err != nil {
|
2015-04-24 15:40:32 +03:00
|
|
|
return err
|
|
|
|
}
|
2015-05-11 14:26:20 +03:00
|
|
|
if err = d.fetchBlocks(); err != nil {
|
2015-04-24 15:40:32 +03:00
|
|
|
return err
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
2015-05-07 21:07:20 +03:00
|
|
|
glog.V(logger.Debug).Infoln("Synchronization completed")
|
2015-04-24 15:40:32 +03:00
|
|
|
|
|
|
|
return nil
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
|
|
|
|
2015-05-10 01:34:07 +03:00
|
|
|
// Cancel cancels all of the operations and resets the queue. It returns true
|
|
|
|
// if the cancel operation was completed.
|
|
|
|
func (d *Downloader) Cancel() bool {
|
|
|
|
// If we're not syncing just return.
|
2015-05-13 14:01:08 +03:00
|
|
|
hs, bs := d.queue.Size()
|
2015-05-10 01:34:07 +03:00
|
|
|
if atomic.LoadInt32(&d.synchronising) == 0 && hs == 0 && bs == 0 {
|
|
|
|
return false
|
|
|
|
}
|
2015-05-13 14:01:08 +03:00
|
|
|
// Close the current cancel channel
|
2015-05-15 19:43:42 +03:00
|
|
|
d.cancelLock.Lock()
|
|
|
|
select {
|
|
|
|
case <-d.cancelCh:
|
|
|
|
// Channel was already closed
|
|
|
|
default:
|
|
|
|
close(d.cancelCh)
|
|
|
|
}
|
|
|
|
d.cancelLock.Unlock()
|
2015-05-10 01:34:07 +03:00
|
|
|
|
|
|
|
// reset the queue
|
|
|
|
d.queue.Reset()
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2015-04-13 17:38:32 +03:00
|
|
|
// XXX Make synchronous
|
2015-05-11 14:26:20 +03:00
|
|
|
func (d *Downloader) fetchHashes(p *peer, h common.Hash) error {
|
2015-05-03 17:09:10 +03:00
|
|
|
var (
|
2015-06-09 14:13:21 +03:00
|
|
|
start = time.Now()
|
2015-05-15 13:14:46 +03:00
|
|
|
active = p // active peer will help determine the current active peer
|
|
|
|
head = common.Hash{} // common and last hash
|
|
|
|
|
2015-06-09 14:13:21 +03:00
|
|
|
timeout = time.NewTimer(0) // timer to dump a non-responsive active peer
|
2015-05-15 13:14:46 +03:00
|
|
|
attempted = make(map[string]bool) // attempted peers will help with retries
|
|
|
|
crossTicker = time.NewTicker(crossCheckCycle) // ticker to periodically check expired cross checks
|
2015-05-03 17:09:10 +03:00
|
|
|
)
|
2015-05-15 13:14:46 +03:00
|
|
|
defer crossTicker.Stop()
|
2015-06-09 14:13:21 +03:00
|
|
|
defer timeout.Stop()
|
|
|
|
|
|
|
|
glog.V(logger.Debug).Infof("Downloading hashes (%x) from %s", h[:4], p.id)
|
|
|
|
<-timeout.C // timeout channel should be initially empty.
|
|
|
|
|
|
|
|
getHashes := func(from common.Hash) {
|
|
|
|
active.getHashes(from)
|
|
|
|
timeout.Reset(hashTTL)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the hash to the queue, and start hash retrieval.
|
|
|
|
d.queue.Insert([]common.Hash{h})
|
|
|
|
getHashes(h)
|
2015-04-18 18:35:03 +03:00
|
|
|
|
2015-05-15 13:14:46 +03:00
|
|
|
attempted[p.id] = true
|
|
|
|
for finished := false; !finished; {
|
2015-04-12 13:38:25 +03:00
|
|
|
select {
|
2015-05-10 01:34:07 +03:00
|
|
|
case <-d.cancelCh:
|
|
|
|
return errCancelHashFetch
|
2015-05-15 13:14:46 +03:00
|
|
|
|
2015-05-03 17:09:10 +03:00
|
|
|
case hashPack := <-d.hashCh:
|
2015-05-06 15:32:53 +03:00
|
|
|
// Make sure the active peer is giving us the hashes
|
2015-05-15 13:14:46 +03:00
|
|
|
if hashPack.peerId != active.id {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Received hashes from incorrect peer(%s)", hashPack.peerId)
|
2015-05-03 17:09:10 +03:00
|
|
|
break
|
|
|
|
}
|
2015-06-09 14:13:21 +03:00
|
|
|
timeout.Stop()
|
2015-04-19 01:15:05 +03:00
|
|
|
|
2015-05-06 15:32:53 +03:00
|
|
|
// Make sure the peer actually gave something valid
|
|
|
|
if len(hashPack.hashes) == 0 {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Peer (%s) responded with empty hash set", active.id)
|
2015-05-26 12:44:09 +03:00
|
|
|
return ErrEmptyHashSet
|
2015-05-06 15:32:53 +03:00
|
|
|
}
|
2015-05-29 21:04:20 +03:00
|
|
|
for index, hash := range hashPack.hashes {
|
2015-05-28 13:06:10 +03:00
|
|
|
if d.banned.Has(hash) {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Peer (%s) sent a known invalid chain", active.id)
|
2015-05-29 21:04:20 +03:00
|
|
|
|
|
|
|
d.queue.Insert(hashPack.hashes[:index+1])
|
|
|
|
if err := d.banBlocks(active.id, hash); err != nil {
|
|
|
|
glog.V(logger.Debug).Infof("Failed to ban batch of blocks: %v", err)
|
|
|
|
}
|
2015-05-28 13:06:10 +03:00
|
|
|
return ErrInvalidChain
|
|
|
|
}
|
|
|
|
}
|
2015-05-06 15:32:53 +03:00
|
|
|
// Determine if we're done fetching hashes (queue up all pending), and continue if not done
|
|
|
|
done, index := false, 0
|
2015-05-15 13:14:46 +03:00
|
|
|
for index, head = range hashPack.hashes {
|
|
|
|
if d.hasBlock(head) || d.queue.GetBlock(head) != nil {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Found common hash %x", head[:4])
|
2015-05-06 15:32:53 +03:00
|
|
|
hashPack.hashes = hashPack.hashes[:index]
|
2015-04-12 13:38:25 +03:00
|
|
|
done = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2015-05-15 01:40:16 +03:00
|
|
|
// Insert all the new hashes, but only continue if got something useful
|
|
|
|
inserts := d.queue.Insert(hashPack.hashes)
|
2015-05-15 13:14:46 +03:00
|
|
|
if len(inserts) == 0 && !done {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Peer (%s) responded with stale hashes", active.id)
|
2015-05-15 01:40:16 +03:00
|
|
|
return ErrBadPeer
|
2015-05-15 02:14:21 +03:00
|
|
|
}
|
|
|
|
if !done {
|
2015-05-21 08:07:58 +03:00
|
|
|
// Check that the peer is not stalling the sync
|
2015-05-21 18:16:04 +03:00
|
|
|
if len(inserts) < MinHashFetch {
|
2015-05-21 08:07:58 +03:00
|
|
|
return ErrStallingPeer
|
|
|
|
}
|
2015-05-15 13:14:46 +03:00
|
|
|
// Try and fetch a random block to verify the hash batch
|
2015-05-15 20:54:10 +03:00
|
|
|
// Skip the last hash as the cross check races with the next hash fetch
|
2015-05-21 08:37:27 +03:00
|
|
|
cross := rand.Intn(len(inserts) - 1)
|
|
|
|
origin, parent := inserts[cross], inserts[cross+1]
|
|
|
|
glog.V(logger.Detail).Infof("Cross checking (%s) with %x/%x", active.id, origin, parent)
|
2015-05-21 08:07:58 +03:00
|
|
|
|
2015-05-21 08:37:27 +03:00
|
|
|
d.checks[origin] = &crossCheck{
|
2015-06-03 14:39:21 +03:00
|
|
|
expire: time.Now().Add(blockSoftTTL),
|
2015-05-21 08:37:27 +03:00
|
|
|
parent: parent,
|
|
|
|
}
|
|
|
|
active.getBlocks([]common.Hash{origin})
|
2015-05-15 13:14:46 +03:00
|
|
|
|
|
|
|
// Also fetch a fresh
|
2015-06-09 14:13:21 +03:00
|
|
|
getHashes(head)
|
2015-05-06 15:32:53 +03:00
|
|
|
continue
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
2015-06-03 19:00:54 +03:00
|
|
|
// We're done, prepare the download cache and proceed pulling the blocks
|
2015-05-06 15:32:53 +03:00
|
|
|
offset := 0
|
2015-05-15 13:14:46 +03:00
|
|
|
if block := d.getBlock(head); block != nil {
|
2015-05-06 15:32:53 +03:00
|
|
|
offset = int(block.NumberU64() + 1)
|
|
|
|
}
|
2015-06-03 19:00:54 +03:00
|
|
|
d.queue.Prepare(offset)
|
2015-05-15 13:14:46 +03:00
|
|
|
finished = true
|
|
|
|
|
|
|
|
case blockPack := <-d.blockCh:
|
|
|
|
// Cross check the block with the random verifications
|
|
|
|
if blockPack.peerId != active.id || len(blockPack.blocks) != 1 {
|
|
|
|
continue
|
|
|
|
}
|
2015-05-15 14:48:57 +03:00
|
|
|
block := blockPack.blocks[0]
|
2015-05-21 08:37:27 +03:00
|
|
|
if check, ok := d.checks[block.Hash()]; ok {
|
|
|
|
if block.ParentHash() != check.parent {
|
2015-05-15 14:48:57 +03:00
|
|
|
return ErrCrossCheckFailed
|
|
|
|
}
|
|
|
|
delete(d.checks, block.Hash())
|
|
|
|
}
|
2015-05-15 13:14:46 +03:00
|
|
|
|
|
|
|
case <-crossTicker.C:
|
|
|
|
// Iterate over all the cross checks and fail the hash chain if they're not verified
|
2015-05-21 08:37:27 +03:00
|
|
|
for hash, check := range d.checks {
|
|
|
|
if time.Now().After(check.expire) {
|
2015-05-15 13:14:46 +03:00
|
|
|
glog.V(logger.Debug).Infof("Cross check timeout for %x", hash)
|
|
|
|
return ErrCrossCheckFailed
|
|
|
|
}
|
|
|
|
}
|
2015-05-06 15:32:53 +03:00
|
|
|
|
2015-05-15 13:14:46 +03:00
|
|
|
case <-timeout.C:
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Peer (%s) didn't respond in time for hash request", p.id)
|
2015-04-18 18:35:03 +03:00
|
|
|
|
2015-05-03 17:09:10 +03:00
|
|
|
var p *peer // p will be set if a peer can be found
|
|
|
|
// Attempt to find a new peer by checking inclusion of peers best hash in our
|
|
|
|
// already fetched hash list. This can't guarantee 100% correctness but does
|
|
|
|
// a fair job. This is always either correct or false incorrect.
|
2015-05-11 14:26:20 +03:00
|
|
|
for _, peer := range d.peers.AllPeers() {
|
2015-05-15 13:14:46 +03:00
|
|
|
if d.queue.Has(peer.head) && !attempted[peer.id] {
|
2015-05-03 17:09:10 +03:00
|
|
|
p = peer
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// if all peers have been tried, abort the process entirely or if the hash is
|
|
|
|
// the zero hash.
|
2015-05-15 13:14:46 +03:00
|
|
|
if p == nil || (head == common.Hash{}) {
|
2015-05-08 15:22:48 +03:00
|
|
|
return ErrTimeout
|
2015-05-03 17:09:10 +03:00
|
|
|
}
|
|
|
|
// set p to the active peer. this will invalidate any hashes that may be returned
|
|
|
|
// by our previous (delayed) peer.
|
2015-05-15 13:14:46 +03:00
|
|
|
active = p
|
2015-06-09 14:13:21 +03:00
|
|
|
getHashes(head)
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Hash fetching switched to new peer(%s)", p.id)
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
|
|
|
}
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Debug).Infof("Downloaded hashes (%d) in %v", d.queue.Pending(), time.Since(start))
|
2015-04-12 13:38:25 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-11 14:26:20 +03:00
|
|
|
// fetchBlocks iteratively downloads the entire schedules block-chain, taking
|
|
|
|
// any available peers, reserving a chunk of blocks for each, wait for delivery
|
|
|
|
// and periodically checking for timeouts.
|
|
|
|
func (d *Downloader) fetchBlocks() error {
|
2015-05-07 21:07:20 +03:00
|
|
|
glog.V(logger.Debug).Infoln("Downloading", d.queue.Pending(), "block(s)")
|
2015-04-12 13:38:25 +03:00
|
|
|
start := time.Now()
|
|
|
|
|
2015-05-29 21:04:20 +03:00
|
|
|
// Start a ticker to continue throttled downloads and check for bad peers
|
2015-04-12 13:38:25 +03:00
|
|
|
ticker := time.NewTicker(20 * time.Millisecond)
|
2015-05-29 21:04:20 +03:00
|
|
|
defer ticker.Stop()
|
|
|
|
|
2015-04-12 13:38:25 +03:00
|
|
|
out:
|
|
|
|
for {
|
|
|
|
select {
|
2015-05-10 01:34:07 +03:00
|
|
|
case <-d.cancelCh:
|
|
|
|
return errCancelBlockFetch
|
2015-05-15 13:32:21 +03:00
|
|
|
|
2015-06-02 15:57:07 +03:00
|
|
|
case <-d.hashCh:
|
|
|
|
// Out of bounds hashes received, ignore them
|
|
|
|
|
2015-04-12 13:38:25 +03:00
|
|
|
case blockPack := <-d.blockCh:
|
2015-05-15 13:32:21 +03:00
|
|
|
// Short circuit if it's a stale cross check
|
|
|
|
if len(blockPack.blocks) == 1 {
|
|
|
|
block := blockPack.blocks[0]
|
|
|
|
if _, ok := d.checks[block.Hash()]; ok {
|
|
|
|
delete(d.checks, block.Hash())
|
2015-05-29 21:04:20 +03:00
|
|
|
break
|
2015-05-15 13:32:21 +03:00
|
|
|
}
|
|
|
|
}
|
2015-04-18 02:10:32 +03:00
|
|
|
// If the peer was previously banned and failed to deliver it's pack
|
|
|
|
// in a reasonable time frame, ignore it's message.
|
2015-05-11 14:26:20 +03:00
|
|
|
if peer := d.peers.Peer(blockPack.peerId); peer != nil {
|
2015-06-04 14:51:14 +03:00
|
|
|
// Deliver the received chunk of blocks, and demote in case of errors
|
2015-06-05 12:37:48 +03:00
|
|
|
err := d.queue.Deliver(blockPack.peerId, blockPack.blocks)
|
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
// If no blocks were delivered, demote the peer (need the delivery above)
|
|
|
|
if len(blockPack.blocks) == 0 {
|
|
|
|
peer.Demote()
|
|
|
|
peer.SetIdle()
|
|
|
|
glog.V(logger.Detail).Infof("%s: no blocks delivered", peer)
|
|
|
|
break
|
2015-05-15 11:58:37 +03:00
|
|
|
}
|
2015-06-05 12:37:48 +03:00
|
|
|
// All was successful, promote the peer
|
|
|
|
peer.Promote()
|
|
|
|
peer.SetIdle()
|
|
|
|
glog.V(logger.Detail).Infof("%s: delivered %d blocks", peer, len(blockPack.blocks))
|
|
|
|
|
|
|
|
case ErrInvalidChain:
|
|
|
|
// The hash chain is invalid (blocks are not ordered properly), abort
|
|
|
|
return err
|
|
|
|
|
|
|
|
case errNoFetchesPending:
|
|
|
|
// Peer probably timed out with its delivery but came through
|
|
|
|
// in the end, demote, but allow to to pull from this peer.
|
2015-05-11 16:47:58 +03:00
|
|
|
peer.Demote()
|
2015-06-03 14:39:21 +03:00
|
|
|
peer.SetIdle()
|
2015-06-05 12:37:48 +03:00
|
|
|
glog.V(logger.Detail).Infof("%s: out of bound delivery", peer)
|
|
|
|
|
|
|
|
case errStaleDelivery:
|
|
|
|
// Delivered something completely else than requested, usually
|
|
|
|
// caused by a timeout and delivery during a new sync cycle.
|
|
|
|
// Don't set it to idle as the original request should still be
|
|
|
|
// in flight.
|
|
|
|
peer.Demote()
|
|
|
|
glog.V(logger.Detail).Infof("%s: stale delivery", peer)
|
|
|
|
|
|
|
|
default:
|
|
|
|
// Peer did something semi-useful, demote but keep it around
|
2015-06-04 14:51:14 +03:00
|
|
|
peer.Demote()
|
|
|
|
peer.SetIdle()
|
2015-06-05 12:37:48 +03:00
|
|
|
glog.V(logger.Detail).Infof("%s: delivery partially failed: %v", peer, err)
|
2015-06-04 14:51:14 +03:00
|
|
|
}
|
2015-04-18 02:10:32 +03:00
|
|
|
}
|
2015-06-02 15:57:07 +03:00
|
|
|
|
2015-04-12 13:38:25 +03:00
|
|
|
case <-ticker.C:
|
2015-06-02 15:57:07 +03:00
|
|
|
// Short circuit if we lost all our peers
|
|
|
|
if d.peers.Len() == 0 {
|
|
|
|
return errNoPeers
|
|
|
|
}
|
|
|
|
// Check for block request timeouts and demote the responsible peers
|
2015-06-03 14:39:21 +03:00
|
|
|
badPeers := d.queue.Expire(blockHardTTL)
|
2015-05-07 12:59:19 +03:00
|
|
|
for _, pid := range badPeers {
|
2015-05-11 16:47:58 +03:00
|
|
|
if peer := d.peers.Peer(pid); peer != nil {
|
|
|
|
peer.Demote()
|
2015-06-05 11:53:46 +03:00
|
|
|
glog.V(logger.Detail).Infof("%s: block delivery timeout", peer)
|
2015-05-11 16:47:58 +03:00
|
|
|
}
|
2015-05-07 12:59:19 +03:00
|
|
|
}
|
2015-06-02 15:57:07 +03:00
|
|
|
// If there are unrequested hashes left start fetching from the available peers
|
2015-05-06 15:32:53 +03:00
|
|
|
if d.queue.Pending() > 0 {
|
|
|
|
// Throttle the download if block cache is full and waiting processing
|
|
|
|
if d.queue.Throttle() {
|
2015-05-29 21:04:20 +03:00
|
|
|
break
|
2015-05-06 15:32:53 +03:00
|
|
|
}
|
2015-05-11 16:47:58 +03:00
|
|
|
// Send a download request to all idle peers, until throttled
|
2015-05-11 14:26:20 +03:00
|
|
|
idlePeers := d.peers.IdlePeers()
|
|
|
|
for _, peer := range idlePeers {
|
2015-05-11 16:47:58 +03:00
|
|
|
// Short circuit if throttling activated since above
|
|
|
|
if d.queue.Throttle() {
|
|
|
|
break
|
|
|
|
}
|
2015-04-12 13:38:25 +03:00
|
|
|
// Get a possible chunk. If nil is returned no chunk
|
|
|
|
// could be returned due to no hashes available.
|
2015-06-03 19:00:54 +03:00
|
|
|
request := d.queue.Reserve(peer, peer.Capacity())
|
2015-05-06 15:32:53 +03:00
|
|
|
if request == nil {
|
2015-04-13 17:38:32 +03:00
|
|
|
continue
|
|
|
|
}
|
2015-06-04 14:51:14 +03:00
|
|
|
if glog.V(logger.Detail) {
|
|
|
|
glog.Infof("%s: requesting %d blocks", peer, len(request.Hashes))
|
|
|
|
}
|
2015-04-13 17:38:32 +03:00
|
|
|
// Fetch the chunk and check for error. If the peer was somehow
|
|
|
|
// already fetching a chunk due to a bug, it will be returned to
|
|
|
|
// the queue
|
2015-05-11 14:26:20 +03:00
|
|
|
if err := peer.Fetch(request); err != nil {
|
2015-06-04 14:51:14 +03:00
|
|
|
glog.V(logger.Error).Infof("Peer %s received double work", peer.id)
|
2015-05-06 15:32:53 +03:00
|
|
|
d.queue.Cancel(request)
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|
|
|
|
}
|
2015-05-11 14:26:20 +03:00
|
|
|
// Make sure that we have peers available for fetching. If all peers have been tried
|
2015-04-18 20:29:30 +03:00
|
|
|
// and all failed throw an error
|
2015-05-06 15:32:53 +03:00
|
|
|
if d.queue.InFlight() == 0 {
|
2015-05-15 01:56:52 +03:00
|
|
|
return errPeersUnavailable
|
2015-04-18 20:29:30 +03:00
|
|
|
}
|
|
|
|
|
2015-05-06 15:32:53 +03:00
|
|
|
} else if d.queue.InFlight() == 0 {
|
|
|
|
// When there are no more queue and no more in flight, We can
|
2015-04-12 13:38:25 +03:00
|
|
|
// safely assume we're done. Another part of the process will check
|
|
|
|
// for parent errors and will re-request anything that's missing
|
|
|
|
break out
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-04-18 18:35:03 +03:00
|
|
|
glog.V(logger.Detail).Infoln("Downloaded block(s) in", time.Since(start))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-29 21:04:20 +03:00
|
|
|
// banBlocks retrieves a batch of blocks from a peer feeding us invalid hashes,
|
|
|
|
// and bans the head of the retrieved batch.
|
|
|
|
//
|
|
|
|
// This method only fetches one single batch as the goal is not ban an entire
|
|
|
|
// (potentially long) invalid chain - wasting a lot of time in the meanwhile -,
|
|
|
|
// but rather to gradually build up a blacklist if the peer keeps reconnecting.
|
|
|
|
func (d *Downloader) banBlocks(peerId string, head common.Hash) error {
|
|
|
|
glog.V(logger.Debug).Infof("Banning a batch out of %d blocks from %s", d.queue.Pending(), peerId)
|
|
|
|
|
|
|
|
// Ask the peer being banned for a batch of blocks from the banning point
|
|
|
|
peer := d.peers.Peer(peerId)
|
|
|
|
if peer == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-06-03 19:00:54 +03:00
|
|
|
request := d.queue.Reserve(peer, MaxBlockFetch)
|
2015-05-29 21:04:20 +03:00
|
|
|
if request == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if err := peer.Fetch(request); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Wait a bit for the reply to arrive, and ban if done so
|
2015-06-02 15:57:07 +03:00
|
|
|
timeout := time.After(blockHardTTL)
|
2015-05-29 21:04:20 +03:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-d.cancelCh:
|
|
|
|
return errCancelBlockFetch
|
|
|
|
|
|
|
|
case <-timeout:
|
|
|
|
return ErrTimeout
|
|
|
|
|
2015-06-02 15:57:07 +03:00
|
|
|
case <-d.hashCh:
|
|
|
|
// Out of bounds hashes received, ignore them
|
|
|
|
|
2015-05-29 21:04:20 +03:00
|
|
|
case blockPack := <-d.blockCh:
|
|
|
|
blocks := blockPack.blocks
|
|
|
|
|
|
|
|
// Short circuit if it's a stale cross check
|
|
|
|
if len(blocks) == 1 {
|
|
|
|
block := blocks[0]
|
|
|
|
if _, ok := d.checks[block.Hash()]; ok {
|
|
|
|
delete(d.checks, block.Hash())
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Short circuit if it's not from the peer being banned
|
|
|
|
if blockPack.peerId != peerId {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// Short circuit if no blocks were returned
|
|
|
|
if len(blocks) == 0 {
|
|
|
|
return errors.New("no blocks returned to ban")
|
|
|
|
}
|
2015-05-30 00:34:23 +03:00
|
|
|
// Reconstruct the original chain order and ensure we're banning the correct blocks
|
|
|
|
types.BlockBy(types.Number).Sort(blocks)
|
2015-05-29 21:04:20 +03:00
|
|
|
if bytes.Compare(blocks[0].Hash().Bytes(), head.Bytes()) != 0 {
|
|
|
|
return errors.New("head block not the banned one")
|
|
|
|
}
|
|
|
|
index := 0
|
|
|
|
for _, block := range blocks[1:] {
|
|
|
|
if bytes.Compare(block.ParentHash().Bytes(), blocks[index].Hash().Bytes()) != 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
index++
|
|
|
|
}
|
2015-06-08 14:06:36 +03:00
|
|
|
// Ban the head hash and phase out any excess
|
2015-05-29 21:04:20 +03:00
|
|
|
d.banned.Add(blocks[index].Hash())
|
2015-06-08 14:06:36 +03:00
|
|
|
for d.banned.Size() > maxBannedHashes {
|
2015-06-08 14:46:31 +03:00
|
|
|
var evacuate common.Hash
|
|
|
|
|
2015-06-08 14:06:36 +03:00
|
|
|
d.banned.Each(func(item interface{}) bool {
|
|
|
|
// Skip any hard coded bans
|
|
|
|
if core.BadHashes[item.(common.Hash)] {
|
|
|
|
return true
|
|
|
|
}
|
2015-06-08 14:46:31 +03:00
|
|
|
evacuate = item.(common.Hash)
|
2015-06-08 14:06:36 +03:00
|
|
|
return false
|
|
|
|
})
|
2015-06-08 14:46:31 +03:00
|
|
|
d.banned.Remove(evacuate)
|
2015-06-08 14:06:36 +03:00
|
|
|
}
|
|
|
|
glog.V(logger.Debug).Infof("Banned %d blocks from: %s", index+1, peerId)
|
2015-05-29 21:04:20 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-13 13:13:43 +03:00
|
|
|
// DeliverBlocks injects a new batch of blocks received from a remote node.
|
|
|
|
// This is usually invoked through the BlocksMsg by the protocol handler.
|
|
|
|
func (d *Downloader) DeliverBlocks(id string, blocks []*types.Block) error {
|
2015-05-10 01:34:07 +03:00
|
|
|
// Make sure the downloader is active
|
|
|
|
if atomic.LoadInt32(&d.synchronising) == 0 {
|
|
|
|
return errNoSyncActive
|
|
|
|
}
|
2015-05-13 13:47:21 +03:00
|
|
|
// Deliver or abort if the sync is canceled while queuing
|
|
|
|
d.cancelLock.RLock()
|
|
|
|
cancel := d.cancelCh
|
|
|
|
d.cancelLock.RUnlock()
|
2015-05-10 01:34:07 +03:00
|
|
|
|
2015-05-13 13:47:21 +03:00
|
|
|
select {
|
|
|
|
case d.blockCh <- blockPack{id, blocks}:
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case <-cancel:
|
|
|
|
return errNoSyncActive
|
|
|
|
}
|
2015-04-19 18:14:15 +03:00
|
|
|
}
|
|
|
|
|
2015-05-13 13:13:43 +03:00
|
|
|
// DeliverHashes injects a new batch of hashes received from a remote node into
|
|
|
|
// the download schedule. This is usually invoked through the BlockHashesMsg by
|
|
|
|
// the protocol handler.
|
|
|
|
func (d *Downloader) DeliverHashes(id string, hashes []common.Hash) error {
|
2015-05-10 01:34:07 +03:00
|
|
|
// Make sure the downloader is active
|
|
|
|
if atomic.LoadInt32(&d.synchronising) == 0 {
|
|
|
|
return errNoSyncActive
|
|
|
|
}
|
2015-05-13 13:47:21 +03:00
|
|
|
// Deliver or abort if the sync is canceled while queuing
|
|
|
|
d.cancelLock.RLock()
|
|
|
|
cancel := d.cancelCh
|
|
|
|
d.cancelLock.RUnlock()
|
2015-04-12 13:38:25 +03:00
|
|
|
|
2015-05-13 13:47:21 +03:00
|
|
|
select {
|
|
|
|
case d.hashCh <- hashPack{id, hashes}:
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case <-cancel:
|
|
|
|
return errNoSyncActive
|
|
|
|
}
|
2015-04-12 13:38:25 +03:00
|
|
|
}
|