mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-27 13:57:58 +00:00
validator_discovery: pass PeerSet to the request (#2372)
* validator_discovery: pass PeerSet to the request * validator_discovery: track PeerSet of connected peers * validator_discovery: fix tests * validator_discovery: fix long line * some fixes * some validator_discovery logs * log validator discovery request * Also connect to validators on `DistributePoV`. * validator_discovery: store the whole state per peer_set * bump spec versions in kusama, polkadot and westend * Correcting doc. * validator_discovery: bump channel capacity * pov-distribution: some cleanup * this should fix the test, but it does not * I just got some brain damage while fixing this Why are you even reading this??? * wrap long line * address some review nits Co-authored-by: Robert Klotzner <robert.klotzner@gmx.at>
This commit is contained in:
@@ -23,6 +23,7 @@ use std::sync::Arc;
|
||||
|
||||
use async_trait::async_trait;
|
||||
use futures::channel::mpsc;
|
||||
use strum::IntoEnumIterator as _;
|
||||
|
||||
use sc_network::multiaddr::{Multiaddr, Protocol};
|
||||
use sc_authority_discovery::Service as AuthorityDiscoveryService;
|
||||
@@ -93,7 +94,11 @@ impl NonRevokedConnectionRequestState {
|
||||
}
|
||||
}
|
||||
|
||||
pub fn on_authority_connected(&mut self, authority: &AuthorityDiscoveryId, peer_id: &PeerId) {
|
||||
pub fn on_authority_connected(
|
||||
&mut self,
|
||||
authority: &AuthorityDiscoveryId,
|
||||
peer_id: &PeerId,
|
||||
) {
|
||||
if self.pending.remove(authority) {
|
||||
// an error may happen if the request was revoked or
|
||||
// the channel's buffer is full, ignoring it is fine
|
||||
@@ -118,7 +123,8 @@ impl NonRevokedConnectionRequestState {
|
||||
/// Returns `Some(id)` iff the request counter is `0`.
|
||||
fn on_revoke(map: &mut HashMap<AuthorityDiscoveryId, u64>, id: AuthorityDiscoveryId) -> Option<AuthorityDiscoveryId> {
|
||||
if let hash_map::Entry::Occupied(mut entry) = map.entry(id) {
|
||||
if entry.get_mut().saturating_sub(1) == 0 {
|
||||
*entry.get_mut() = entry.get().saturating_sub(1);
|
||||
if *entry.get() == 0 {
|
||||
return Some(entry.remove_entry().0);
|
||||
}
|
||||
}
|
||||
@@ -135,6 +141,14 @@ fn peer_id_from_multiaddr(addr: &Multiaddr) -> Option<PeerId> {
|
||||
}
|
||||
|
||||
pub(super) struct Service<N, AD> {
|
||||
// indexed by PeerSet as usize
|
||||
state: Vec<StatePerPeerSet>,
|
||||
// PhantomData used to make the struct generic instead of having generic methods
|
||||
_phantom: PhantomData<(N, AD)>,
|
||||
}
|
||||
|
||||
#[derive(Default)]
|
||||
struct StatePerPeerSet {
|
||||
// Peers that are connected to us and authority ids associated to them.
|
||||
connected_peers: HashMap<PeerId, HashSet<AuthorityDiscoveryId>>,
|
||||
// The `u64` counts the number of pending non-revoked requests for this validator
|
||||
@@ -143,20 +157,20 @@ pub(super) struct Service<N, AD> {
|
||||
// Invariant: the value > 0 for non-revoked requests.
|
||||
requested_validators: HashMap<AuthorityDiscoveryId, u64>,
|
||||
non_revoked_discovery_requests: Vec<NonRevokedConnectionRequestState>,
|
||||
// PhantomData used to make the struct generic instead of having generic methods
|
||||
_phantom: PhantomData<(N, AD)>,
|
||||
}
|
||||
|
||||
impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
pub fn new() -> Self {
|
||||
Self {
|
||||
connected_peers: HashMap::new(),
|
||||
requested_validators: HashMap::new(),
|
||||
non_revoked_discovery_requests: Vec::new(),
|
||||
state: PeerSet::iter().map(|_| Default::default()).collect(),
|
||||
_phantom: PhantomData,
|
||||
}
|
||||
}
|
||||
|
||||
fn state_mut(&mut self, peer_set: PeerSet) -> &mut StatePerPeerSet {
|
||||
&mut self.state[peer_set as usize]
|
||||
}
|
||||
|
||||
/// Find connected validators using the given `validator_ids`.
|
||||
///
|
||||
/// Returns a [`HashMap`] that contains the found [`AuthorityDiscoveryId`]'s and their associated [`PeerId`]'s.
|
||||
@@ -164,15 +178,24 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
async fn find_connected_validators(
|
||||
&mut self,
|
||||
validator_ids: &[AuthorityDiscoveryId],
|
||||
peer_set: PeerSet,
|
||||
authority_discovery_service: &mut AD,
|
||||
) -> HashMap<AuthorityDiscoveryId, PeerId> {
|
||||
let mut result = HashMap::new();
|
||||
let state = self.state_mut(peer_set);
|
||||
|
||||
for id in validator_ids {
|
||||
// First check if we already cached the validator
|
||||
if let Some(pid) = self.connected_peers
|
||||
if let Some(pid) = state.connected_peers
|
||||
.iter()
|
||||
.find_map(|(pid, ids)| if ids.contains(&id) { Some(pid) } else { None }) {
|
||||
.find_map(|(pid, ids)| {
|
||||
if ids.contains(&id) {
|
||||
Some(pid)
|
||||
} else {
|
||||
None
|
||||
}
|
||||
})
|
||||
{
|
||||
result.insert(id.clone(), pid.clone());
|
||||
continue;
|
||||
}
|
||||
@@ -180,9 +203,9 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
// If not ask the authority discovery
|
||||
if let Some(addresses) = authority_discovery_service.get_addresses_by_authority_id(id.clone()).await {
|
||||
for peer_id in addresses.iter().filter_map(peer_id_from_multiaddr) {
|
||||
if let Some(ids) = self.connected_peers.get_mut(&peer_id) {
|
||||
if let Some(ids) = state.connected_peers.get_mut(&peer_id) {
|
||||
ids.insert(id.clone());
|
||||
result.insert(id.clone(), peer_id.clone());
|
||||
result.insert(id.clone(), peer_id);
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -202,15 +225,22 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
pub async fn on_request(
|
||||
&mut self,
|
||||
validator_ids: Vec<AuthorityDiscoveryId>,
|
||||
peer_set: PeerSet,
|
||||
mut connected: mpsc::Sender<(AuthorityDiscoveryId, PeerId)>,
|
||||
mut network_service: N,
|
||||
mut authority_discovery_service: AD,
|
||||
) -> (N, AD) {
|
||||
const MAX_ADDR_PER_PEER: usize = 3;
|
||||
|
||||
let already_connected = self.find_connected_validators(
|
||||
&validator_ids,
|
||||
peer_set,
|
||||
&mut authority_discovery_service,
|
||||
).await;
|
||||
|
||||
let state = self.state_mut(peer_set);
|
||||
// Increment the counter of how many times the validators were requested.
|
||||
validator_ids.iter().for_each(|id| *self.requested_validators.entry(id.clone()).or_default() += 1);
|
||||
let already_connected = self.find_connected_validators(&validator_ids, &mut authority_discovery_service).await;
|
||||
validator_ids.iter().for_each(|id| *state.requested_validators.entry(id.clone()).or_default() += 1);
|
||||
|
||||
// try to send already connected peers
|
||||
for (id, peer) in already_connected.iter() {
|
||||
@@ -218,7 +248,7 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
Err(e) if e.is_disconnected() => {
|
||||
// the request is already revoked
|
||||
for peer_id in validator_ids {
|
||||
let _ = on_revoke(&mut self.requested_validators, peer_id);
|
||||
let _ = on_revoke(&mut state.requested_validators, peer_id);
|
||||
}
|
||||
return (network_service, authority_discovery_service);
|
||||
}
|
||||
@@ -238,10 +268,6 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
let result = authority_discovery_service.get_addresses_by_authority_id(authority.clone()).await;
|
||||
if let Some(addresses) = result {
|
||||
// We might have several `PeerId`s per `AuthorityId`
|
||||
// depending on the number of sentry nodes,
|
||||
// so we limit the max number of sentries per node to connect to.
|
||||
// They are going to be removed soon though:
|
||||
// https://github.com/paritytech/substrate/issues/6845
|
||||
multiaddr_to_add.extend(addresses.into_iter().take(MAX_ADDR_PER_PEER));
|
||||
}
|
||||
}
|
||||
@@ -249,10 +275,10 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
// clean up revoked requests
|
||||
let mut revoked_indices = Vec::new();
|
||||
let mut revoked_validators = Vec::new();
|
||||
for (i, maybe_revoked) in self.non_revoked_discovery_requests.iter_mut().enumerate() {
|
||||
for (i, maybe_revoked) in state.non_revoked_discovery_requests.iter_mut().enumerate() {
|
||||
if maybe_revoked.is_revoked() {
|
||||
for id in maybe_revoked.requested() {
|
||||
if let Some(id) = on_revoke(&mut self.requested_validators, id.clone()) {
|
||||
if let Some(id) = on_revoke(&mut state.requested_validators, id.clone()) {
|
||||
revoked_validators.push(id);
|
||||
}
|
||||
}
|
||||
@@ -262,7 +288,7 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
|
||||
// clean up revoked requests states
|
||||
for to_revoke in revoked_indices.into_iter().rev() {
|
||||
drop(self.non_revoked_discovery_requests.swap_remove(to_revoke));
|
||||
drop(state.non_revoked_discovery_requests.swap_remove(to_revoke));
|
||||
}
|
||||
|
||||
// multiaddresses to remove
|
||||
@@ -277,33 +303,23 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
// ask the network to connect to these nodes and not disconnect
|
||||
// from them until removed from the set
|
||||
if let Err(e) = network_service.add_peers_to_reserved_set(
|
||||
PeerSet::Collation.into_protocol_name(),
|
||||
peer_set.into_protocol_name(),
|
||||
multiaddr_to_add.clone(),
|
||||
).await {
|
||||
tracing::warn!(target: LOG_TARGET, err = ?e, "AuthorityDiscoveryService returned an invalid multiaddress");
|
||||
}
|
||||
if let Err(e) = network_service.add_peers_to_reserved_set(
|
||||
PeerSet::Validation.into_protocol_name(),
|
||||
multiaddr_to_add,
|
||||
).await {
|
||||
tracing::warn!(target: LOG_TARGET, err = ?e, "AuthorityDiscoveryService returned an invalid multiaddress");
|
||||
}
|
||||
// the addresses are known to be valid
|
||||
let _ = network_service.remove_peers_from_reserved_set(
|
||||
PeerSet::Collation.into_protocol_name(),
|
||||
peer_set.into_protocol_name(),
|
||||
multiaddr_to_remove.clone()
|
||||
).await;
|
||||
let _ = network_service.remove_peers_from_reserved_set(
|
||||
PeerSet::Validation.into_protocol_name(),
|
||||
multiaddr_to_remove
|
||||
).await;
|
||||
|
||||
let pending = validator_ids.iter()
|
||||
.cloned()
|
||||
.filter(|id| !already_connected.contains_key(id))
|
||||
.collect::<HashSet<_>>();
|
||||
|
||||
self.non_revoked_discovery_requests.push(NonRevokedConnectionRequestState::new(
|
||||
state.non_revoked_discovery_requests.push(NonRevokedConnectionRequestState::new(
|
||||
validator_ids,
|
||||
pending,
|
||||
connected,
|
||||
@@ -314,23 +330,30 @@ impl<N: Network, AD: AuthorityDiscovery> Service<N, AD> {
|
||||
|
||||
/// Should be called when a peer connected.
|
||||
#[tracing::instrument(level = "trace", skip(self, authority_discovery_service), fields(subsystem = LOG_TARGET))]
|
||||
pub async fn on_peer_connected(&mut self, peer_id: &PeerId, authority_discovery_service: &mut AD) {
|
||||
pub async fn on_peer_connected(
|
||||
&mut self,
|
||||
peer_id: PeerId,
|
||||
peer_set: PeerSet,
|
||||
authority_discovery_service: &mut AD,
|
||||
) {
|
||||
let state = self.state_mut(peer_set);
|
||||
// check if it's an authority we've been waiting for
|
||||
let maybe_authority = authority_discovery_service.get_authority_id_by_peer_id(peer_id.clone()).await;
|
||||
if let Some(authority) = maybe_authority {
|
||||
for request in self.non_revoked_discovery_requests.iter_mut() {
|
||||
let _ = request.on_authority_connected(&authority, peer_id);
|
||||
for request in state.non_revoked_discovery_requests.iter_mut() {
|
||||
let _ = request.on_authority_connected(&authority, &peer_id);
|
||||
}
|
||||
|
||||
self.connected_peers.entry(peer_id.clone()).or_default().insert(authority);
|
||||
state.connected_peers.entry(peer_id).or_default().insert(authority);
|
||||
} else {
|
||||
self.connected_peers.insert(peer_id.clone(), Default::default());
|
||||
state.connected_peers.insert(peer_id, Default::default());
|
||||
}
|
||||
}
|
||||
|
||||
/// Should be called when a peer disconnected.
|
||||
pub fn on_peer_disconnected(&mut self, peer_id: &PeerId) {
|
||||
self.connected_peers.remove(peer_id);
|
||||
pub fn on_peer_disconnected(&mut self, peer_id: &PeerId, peer_set: PeerSet) {
|
||||
let state = self.state_mut(peer_set);
|
||||
state.connected_peers.remove(peer_id);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -453,10 +476,11 @@ mod tests {
|
||||
let req1 = vec![authority_ids[0].clone(), authority_ids[1].clone()];
|
||||
let (sender, mut receiver) = mpsc::channel(2);
|
||||
|
||||
service.on_peer_connected(&peer_ids[0], &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[0].clone(), PeerSet::Validation, &mut ads).await;
|
||||
|
||||
let _ = service.on_request(
|
||||
req1,
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
@@ -485,18 +509,19 @@ mod tests {
|
||||
|
||||
let (_, mut ads) = service.on_request(
|
||||
req1,
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
).await;
|
||||
|
||||
|
||||
service.on_peer_connected(&peer_ids[0], &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[0].clone(), PeerSet::Validation, &mut ads).await;
|
||||
let reply1 = receiver.next().await.unwrap();
|
||||
assert_eq!(reply1.0, authority_ids[0]);
|
||||
assert_eq!(reply1.1, peer_ids[0]);
|
||||
|
||||
service.on_peer_connected(&peer_ids[1], &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[1].clone(), PeerSet::Validation, &mut ads).await;
|
||||
let reply2 = receiver.next().await.unwrap();
|
||||
assert_eq!(reply2.0, authority_ids[1]);
|
||||
assert_eq!(reply2.1, peer_ids[1]);
|
||||
@@ -516,11 +541,12 @@ mod tests {
|
||||
futures::executor::block_on(async move {
|
||||
let (sender, mut receiver) = mpsc::channel(1);
|
||||
|
||||
service.on_peer_connected(&peer_ids[0], &mut ads).await;
|
||||
service.on_peer_connected(&peer_ids[1], &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[0].clone(), PeerSet::Validation, &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[1].clone(), PeerSet::Validation, &mut ads).await;
|
||||
|
||||
let (ns, ads) = service.on_request(
|
||||
vec![authority_ids[0].clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
@@ -534,6 +560,7 @@ mod tests {
|
||||
|
||||
let _ = service.on_request(
|
||||
vec![authority_ids[1].clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
@@ -542,7 +569,8 @@ mod tests {
|
||||
let reply = receiver.next().await.unwrap();
|
||||
assert_eq!(reply.0, authority_ids[1]);
|
||||
assert_eq!(reply.1, peer_ids[1]);
|
||||
assert_eq!(service.non_revoked_discovery_requests.len(), 1);
|
||||
let state = service.state_mut(PeerSet::Validation);
|
||||
assert_eq!(state.non_revoked_discovery_requests.len(), 1);
|
||||
});
|
||||
}
|
||||
|
||||
@@ -559,11 +587,12 @@ mod tests {
|
||||
futures::executor::block_on(async move {
|
||||
let (sender, mut receiver) = mpsc::channel(1);
|
||||
|
||||
service.on_peer_connected(&peer_ids[0], &mut ads).await;
|
||||
service.on_peer_connected(&peer_ids[1], &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[0].clone(), PeerSet::Validation, &mut ads).await;
|
||||
service.on_peer_connected(peer_ids[1].clone(), PeerSet::Validation, &mut ads).await;
|
||||
|
||||
let (ns, ads) = service.on_request(
|
||||
vec![authority_ids[0].clone(), authority_ids[2].clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
@@ -577,13 +606,15 @@ mod tests {
|
||||
|
||||
let (ns, ads) = service.on_request(
|
||||
vec![authority_ids[0].clone(), authority_ids[1].clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
).await;
|
||||
|
||||
let _ = receiver.next().await.unwrap();
|
||||
assert_eq!(service.non_revoked_discovery_requests.len(), 1);
|
||||
let state = service.state_mut(PeerSet::Validation);
|
||||
assert_eq!(state.non_revoked_discovery_requests.len(), 1);
|
||||
assert_eq!(ns.peers_set.len(), 2);
|
||||
|
||||
// revoke the second request
|
||||
@@ -593,13 +624,15 @@ mod tests {
|
||||
|
||||
let (ns, _) = service.on_request(
|
||||
vec![authority_ids[0].clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
).await;
|
||||
|
||||
let _ = receiver.next().await.unwrap();
|
||||
assert_eq!(service.non_revoked_discovery_requests.len(), 1);
|
||||
let state = service.state_mut(PeerSet::Validation);
|
||||
assert_eq!(state.non_revoked_discovery_requests.len(), 1);
|
||||
assert_eq!(ns.peers_set.len(), 1);
|
||||
});
|
||||
}
|
||||
@@ -619,7 +652,7 @@ mod tests {
|
||||
futures::executor::block_on(async move {
|
||||
let (sender, mut receiver) = mpsc::channel(1);
|
||||
|
||||
service.on_peer_connected(&validator_peer_id, &mut ads).await;
|
||||
service.on_peer_connected(validator_peer_id.clone(), PeerSet::Validation, &mut ads).await;
|
||||
|
||||
let address = known_multiaddr()[0].clone().with(Protocol::P2p(validator_peer_id.clone().into()));
|
||||
ads.by_peer_id.insert(validator_peer_id.clone(), validator_id.clone());
|
||||
@@ -627,13 +660,20 @@ mod tests {
|
||||
|
||||
let _ = service.on_request(
|
||||
vec![validator_id.clone()],
|
||||
PeerSet::Validation,
|
||||
sender,
|
||||
ns,
|
||||
ads,
|
||||
).await;
|
||||
|
||||
assert_eq!((validator_id.clone(), validator_peer_id.clone()), receiver.next().await.unwrap());
|
||||
assert!(service.connected_peers.get(&validator_peer_id).unwrap().contains(&validator_id));
|
||||
let state = service.state_mut(PeerSet::Validation);
|
||||
assert!(
|
||||
state.connected_peers
|
||||
.get(&validator_peer_id)
|
||||
.unwrap()
|
||||
.contains(&validator_id)
|
||||
);
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user