mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-09 09:27:59 +00:00
80616f6d03
[litep2p](https://github.com/altonen/litep2p) is a libp2p-compatible P2P networking library. It supports all of the features of `rust-libp2p` that are currently being utilized by Polkadot SDK. Compared to `rust-libp2p`, `litep2p` has a quite different architecture which is why the new `litep2p` network backend is only able to use a little of the existing code in `sc-network`. The design has been mainly influenced by how we'd wish to structure our networking-related code in Polkadot SDK: independent higher-levels protocols directly communicating with the network over links that support bidirectional backpressure. A good example would be `NotificationHandle`/`RequestResponseHandle` abstractions which allow, e.g., `SyncingEngine` to directly communicate with peers to announce/request blocks. I've tried running `polkadot --network-backend litep2p` with a few different peer configurations and there is a noticeable reduction in networking CPU usage. For high load (`--out-peers 200`), networking CPU usage goes down from ~110% to ~30% (80 pp) and for normal load (`--out-peers 40`), the usage goes down from ~55% to ~18% (37 pp). These should not be taken as final numbers because: a) there are still some low-hanging optimization fruits, such as enabling [receive window auto-tuning](https://github.com/libp2p/rust-yamux/pull/176), integrating `Peerset` more closely with `litep2p` or improving memory usage of the WebSocket transport b) fixing bugs/instabilities that incorrectly cause `litep2p` to do less work will increase the networking CPU usage c) verification in a more diverse set of tests/conditions is needed Nevertheless, these numbers should give an early estimate for CPU usage of the new networking backend. This PR consists of three separate changes: * introduce a generic `PeerId` (wrapper around `Multihash`) so that we don't have use `NetworkService::PeerId` in every part of the code that uses a `PeerId` * introduce `NetworkBackend` trait, implement it for the libp2p network stack and make Polkadot SDK generic over `NetworkBackend` * implement `NetworkBackend` for litep2p The new library should be considered experimental which is why `rust-libp2p` will remain as the default option for the time being. This PR currently depends on the master branch of `litep2p` but I'll cut a new release for the library once all review comments have been addresses. --------- Signed-off-by: Alexandru Vasile <alexandru.vasile@parity.io> Co-authored-by: Dmitry Markin <dmitry@markin.tech> Co-authored-by: Alexandru Vasile <60601340+lexnv@users.noreply.github.com> Co-authored-by: Alexandru Vasile <alexandru.vasile@parity.io>
106 lines
3.2 KiB
Rust
106 lines
3.2 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
use crate::{
|
|
new_worker_and_service,
|
|
worker::{
|
|
tests::{TestApi, TestNetwork},
|
|
Role,
|
|
},
|
|
};
|
|
|
|
use futures::{channel::mpsc::channel, executor::LocalPool, task::LocalSpawn};
|
|
use libp2p::identity::ed25519;
|
|
use std::{collections::HashSet, sync::Arc};
|
|
|
|
use sc_network::{multiaddr::Protocol, Multiaddr, PeerId};
|
|
use sp_authority_discovery::AuthorityId;
|
|
use sp_core::crypto::key_types;
|
|
use sp_keystore::{testing::MemoryKeystore, Keystore};
|
|
|
|
#[test]
|
|
fn get_addresses_and_authority_id() {
|
|
let (_dht_event_tx, dht_event_rx) = channel(0);
|
|
let network: Arc<TestNetwork> = Arc::new(Default::default());
|
|
|
|
let mut pool = LocalPool::new();
|
|
|
|
let key_store = MemoryKeystore::new();
|
|
|
|
let remote_authority_id: AuthorityId = pool.run_until(async {
|
|
key_store
|
|
.sr25519_generate_new(key_types::AUTHORITY_DISCOVERY, None)
|
|
.unwrap()
|
|
.into()
|
|
});
|
|
|
|
let remote_peer_id = PeerId::random();
|
|
let remote_addr = "/ip6/2001:db8:0:0:0:0:0:2/tcp/30333"
|
|
.parse::<Multiaddr>()
|
|
.unwrap()
|
|
.with(Protocol::P2p(remote_peer_id.into()));
|
|
|
|
let test_api = Arc::new(TestApi { authorities: vec![] });
|
|
|
|
let (mut worker, mut service) = new_worker_and_service(
|
|
test_api,
|
|
network.clone(),
|
|
Box::pin(dht_event_rx),
|
|
Role::PublishAndDiscover(key_store.into()),
|
|
None,
|
|
);
|
|
worker.inject_addresses(remote_authority_id.clone(), vec![remote_addr.clone()]);
|
|
|
|
pool.spawner().spawn_local_obj(Box::pin(worker.run()).into()).unwrap();
|
|
|
|
pool.run_until(async {
|
|
assert_eq!(
|
|
Some(HashSet::from([remote_addr])),
|
|
service.get_addresses_by_authority_id(remote_authority_id.clone()).await,
|
|
);
|
|
assert_eq!(
|
|
Some(HashSet::from([remote_authority_id])),
|
|
service.get_authority_ids_by_peer_id(remote_peer_id.into()).await,
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn cryptos_are_compatible() {
|
|
use sp_core::crypto::Pair;
|
|
|
|
let libp2p_keypair = ed25519::Keypair::generate();
|
|
let libp2p_public = libp2p_keypair.public();
|
|
|
|
let sp_core_secret =
|
|
{ sp_core::ed25519::Pair::from_seed_slice(&libp2p_keypair.secret().as_ref()).unwrap() };
|
|
let sp_core_public = sp_core_secret.public();
|
|
|
|
let message = b"we are more powerful than not to be better";
|
|
|
|
let libp2p_signature = libp2p_keypair.sign(message);
|
|
let sp_core_signature = sp_core_secret.sign(message); // no error expected...
|
|
|
|
assert!(sp_core::ed25519::Pair::verify(
|
|
&sp_core::ed25519::Signature::try_from(libp2p_signature.as_slice()).unwrap(),
|
|
message,
|
|
&sp_core_public
|
|
));
|
|
assert!(libp2p_public.verify(message, sp_core_signature.as_ref()));
|
|
}
|