mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-27 05:47:58 +00:00
* More doc fixes. * Minor refactorings in the process of #2177 By having everything peer set related depend directly on the enum the code becomes more clear and it is also straight forward to add more peersets/protocols as the compiler will complain if you forget to implement parts of it. * Add peer set infos on startup properly For feature real_overseer. + Fixes from review. Thanks @coriolinus and @ordian! * More structure in network-bridge Some changes, which would have helped me in groking the code faster. Entry points/public types more to the top. Factored out implementation in their own files, to clear up the top-level view. * Get rid of local ProtocolName type definition. Does not add much at this level. * Fix tests + import cleanup. * Make spaces tabs. * Clarify what correct parameters to send_message are * Be more less vague in docs of send_message. * Apply suggestions from code review Extend copyright on new files to 2021 as well. Co-authored-by: Andronik Ordian <write@reusable.software> Co-authored-by: Andronik Ordian <write@reusable.software>
This commit is contained in:
@@ -28,6 +28,7 @@ use sc_network::multiaddr::{Multiaddr, Protocol};
|
||||
use sc_authority_discovery::Service as AuthorityDiscoveryService;
|
||||
use polkadot_node_network_protocol::PeerId;
|
||||
use polkadot_primitives::v1::{AuthorityDiscoveryId, Block, Hash};
|
||||
use polkadot_node_network_protocol::peer_set::PeerSet;
|
||||
|
||||
const LOG_TARGET: &str = "validator_discovery";
|
||||
|
||||
@@ -276,24 +277,24 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
// ask the network to connect to these nodes and not disconnect
|
||||
// from them until removed from the set
|
||||
if let Err(e) = network_service.add_peers_to_reserved_set(
|
||||
super::COLLATION_PROTOCOL_NAME.into(),
|
||||
PeerSet::Collation.into_protocol_name(),
|
||||
multiaddr_to_add.clone(),
|
||||
).await {
|
||||
tracing::warn!(target: LOG_TARGET, err = ?e, "AuthorityDiscoveryService returned an invalid multiaddress");
|
||||
}
|
||||
if let Err(e) = network_service.add_peers_to_reserved_set(
|
||||
super::VALIDATION_PROTOCOL_NAME.into(),
|
||||
PeerSet::Validation.into_protocol_name(),
|
||||
multiaddr_to_add,
|
||||
).await {
|
||||
tracing::warn!(target: LOG_TARGET, err = ?e, "AuthorityDiscoveryService returned an invalid multiaddress");
|
||||
}
|
||||
// the addresses are known to be valid
|
||||
let _ = network_service.remove_peers_from_reserved_set(
|
||||
super::COLLATION_PROTOCOL_NAME.into(),
|
||||
PeerSet::Collation.into_protocol_name(),
|
||||
multiaddr_to_remove.clone()
|
||||
).await;
|
||||
let _ = network_service.remove_peers_from_reserved_set(
|
||||
super::VALIDATION_PROTOCOL_NAME.into(),
|
||||
PeerSet::Validation.into_protocol_name(),
|
||||
multiaddr_to_remove
|
||||
).await;
|
||||
|
||||
|
||||
Reference in New Issue
Block a user