mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-30 18:57:57 +00:00
60e5011c72
* Adding first rough ouline of the repository structure * Remove old CI stuff * add title * formatting fixes * move node-exits job's script to scripts dir * Move docs into subdir * move to bin * move maintainence scripts, configs and helpers into its own dir * add .local to ignore * move core->client * start up 'test' area * move test client * move test runtime * make test move compile * Add dependencies rule enforcement. * Fix indexing. * Update docs to reflect latest changes * Moving /srml->/paint * update docs * move client/sr-* -> primitives/ * clean old readme * remove old broken code in rhd * update lock * Step 1. * starting to untangle client * Fix after merge. * start splitting out client interfaces * move children and blockchain interfaces * Move trie and state-machine to primitives. * Fix WASM builds. * fixing broken imports * more interface moves * move backend and light to interfaces * move CallExecutor * move cli off client * moving around more interfaces * re-add consensus crates into the mix * fix subkey path * relieve client from executor * starting to pull out client from grandpa * move is_decendent_of out of client * grandpa still depends on client directly * lemme tests pass * rename srml->paint * Make it compile. * rename interfaces->client-api * Move keyring to primitives. * fixup libp2p dep * fix broken use * allow dependency enforcement to fail * move fork-tree * Moving wasm-builder * make env * move build-script-utils * fixup broken crate depdencies and names * fix imports for authority discovery * fix typo * update cargo.lock * fixing imports * Fix paths and add missing crates * re-add missing crates
323 lines
12 KiB
Rust
323 lines
12 KiB
Rust
// Copyright 2019 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use fnv::FnvHashMap;
|
|
use futures::prelude::*;
|
|
use futures03::{StreamExt as _, TryStreamExt as _};
|
|
use libp2p::Multiaddr;
|
|
use libp2p::core::{ConnectedPoint, either::EitherOutput, PeerId, PublicKey};
|
|
use libp2p::swarm::{IntoProtocolsHandler, IntoProtocolsHandlerSelect, ProtocolsHandler};
|
|
use libp2p::swarm::{NetworkBehaviour, NetworkBehaviourAction, PollParameters};
|
|
use libp2p::identify::{Identify, IdentifyEvent, IdentifyInfo};
|
|
use libp2p::ping::{Ping, PingConfig, PingEvent, PingSuccess};
|
|
use log::{debug, trace, error};
|
|
use std::collections::hash_map::Entry;
|
|
use std::time::{Duration, Instant};
|
|
use tokio_io::{AsyncRead, AsyncWrite};
|
|
use futures_timer::Interval;
|
|
|
|
/// Time after we disconnect from a node before we purge its information from the cache.
|
|
const CACHE_EXPIRE: Duration = Duration::from_secs(10 * 60);
|
|
/// Interval at which we perform garbage collection on the node info.
|
|
const GARBAGE_COLLECT_INTERVAL: Duration = Duration::from_secs(2 * 60);
|
|
|
|
/// Implementation of `NetworkBehaviour` that holds information about nodes in cache for diagnostic
|
|
/// purposes.
|
|
pub struct DebugInfoBehaviour<TSubstream> {
|
|
/// Periodically ping nodes, and close the connection if it's unresponsive.
|
|
ping: Ping<TSubstream>,
|
|
/// Periodically identifies the remote and responds to incoming requests.
|
|
identify: Identify<TSubstream>,
|
|
/// Information that we know about all nodes.
|
|
nodes_info: FnvHashMap<PeerId, NodeInfo>,
|
|
/// Interval at which we perform garbage collection in `nodes_info`.
|
|
garbage_collect: Box<dyn Stream<Item = (), Error = ()> + Send>,
|
|
}
|
|
|
|
/// Information about a node we're connected to.
|
|
#[derive(Debug)]
|
|
struct NodeInfo {
|
|
/// When we will remove the entry about this node from the list, or `None` if we're connected
|
|
/// to the node.
|
|
info_expire: Option<Instant>,
|
|
/// How we're connected to the node.
|
|
endpoint: ConnectedPoint,
|
|
/// Version reported by the remote, or `None` if unknown.
|
|
client_version: Option<String>,
|
|
/// Latest ping time with this node.
|
|
latest_ping: Option<Duration>,
|
|
}
|
|
|
|
impl<TSubstream> DebugInfoBehaviour<TSubstream> {
|
|
/// Builds a new `DebugInfoBehaviour`.
|
|
pub fn new(
|
|
user_agent: String,
|
|
local_public_key: PublicKey,
|
|
) -> Self {
|
|
let identify = {
|
|
let proto_version = "/substrate/1.0".to_string();
|
|
Identify::new(proto_version, user_agent, local_public_key.clone())
|
|
};
|
|
|
|
DebugInfoBehaviour {
|
|
ping: Ping::new(PingConfig::new()),
|
|
identify,
|
|
nodes_info: FnvHashMap::default(),
|
|
garbage_collect: Box::new(Interval::new(GARBAGE_COLLECT_INTERVAL).map(|()| Ok(())).compat()),
|
|
}
|
|
}
|
|
|
|
/// Borrows `self` and returns a struct giving access to the information about a node.
|
|
///
|
|
/// Returns `None` if we don't know anything about this node. Always returns `Some` for nodes
|
|
/// we're connected to, meaning that if `None` is returned then we're not connected to that
|
|
/// node.
|
|
pub fn node(&self, peer_id: &PeerId) -> Option<Node> {
|
|
self.nodes_info.get(peer_id).map(Node)
|
|
}
|
|
|
|
/// Inserts a ping time in the cache. Has no effect if we don't have any entry for that node,
|
|
/// which shouldn't happen.
|
|
fn handle_ping_report(&mut self, peer_id: &PeerId, ping_time: Duration) {
|
|
trace!(target: "sub-libp2p", "Ping time with {:?}: {:?}", peer_id, ping_time);
|
|
if let Some(entry) = self.nodes_info.get_mut(peer_id) {
|
|
entry.latest_ping = Some(ping_time);
|
|
} else {
|
|
error!(target: "sub-libp2p",
|
|
"Received ping from node we're not connected to {:?}", peer_id);
|
|
}
|
|
}
|
|
|
|
/// Inserts an identify record in the cache. Has no effect if we don't have any entry for that
|
|
/// node, which shouldn't happen.
|
|
fn handle_identify_report(&mut self, peer_id: &PeerId, info: &IdentifyInfo) {
|
|
trace!(target: "sub-libp2p", "Identified {:?} => {:?}", peer_id, info);
|
|
if let Some(entry) = self.nodes_info.get_mut(peer_id) {
|
|
entry.client_version = Some(info.agent_version.clone());
|
|
} else {
|
|
error!(target: "sub-libp2p",
|
|
"Received pong from node we're not connected to {:?}", peer_id);
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Gives access to the information about a node.
|
|
pub struct Node<'a>(&'a NodeInfo);
|
|
|
|
impl<'a> Node<'a> {
|
|
/// Returns the endpoint we are connected to or were last connected to.
|
|
pub fn endpoint(&self) -> &'a ConnectedPoint {
|
|
&self.0.endpoint
|
|
}
|
|
|
|
/// Returns the latest version information we know of.
|
|
pub fn client_version(&self) -> Option<&'a str> {
|
|
self.0.client_version.as_ref().map(|s| &s[..])
|
|
}
|
|
|
|
/// Returns the latest ping time we know of for this node. `None` if we never successfully
|
|
/// pinged this node.
|
|
pub fn latest_ping(&self) -> Option<Duration> {
|
|
self.0.latest_ping
|
|
}
|
|
}
|
|
|
|
/// Event that can be emitted by the behaviour.
|
|
#[derive(Debug)]
|
|
pub enum DebugInfoEvent {
|
|
/// We have obtained debug information from a peer, including the addresses it is listening
|
|
/// on.
|
|
Identified {
|
|
/// Id of the peer that has been identified.
|
|
peer_id: PeerId,
|
|
/// Information about the peer.
|
|
info: IdentifyInfo,
|
|
},
|
|
}
|
|
|
|
impl<TSubstream> NetworkBehaviour for DebugInfoBehaviour<TSubstream>
|
|
where TSubstream: AsyncRead + AsyncWrite {
|
|
type ProtocolsHandler = IntoProtocolsHandlerSelect<
|
|
<Ping<TSubstream> as NetworkBehaviour>::ProtocolsHandler,
|
|
<Identify<TSubstream> as NetworkBehaviour>::ProtocolsHandler
|
|
>;
|
|
type OutEvent = DebugInfoEvent;
|
|
|
|
fn new_handler(&mut self) -> Self::ProtocolsHandler {
|
|
IntoProtocolsHandler::select(self.ping.new_handler(), self.identify.new_handler())
|
|
}
|
|
|
|
fn addresses_of_peer(&mut self, peer_id: &PeerId) -> Vec<Multiaddr> {
|
|
let mut list = self.ping.addresses_of_peer(peer_id);
|
|
list.extend_from_slice(&self.identify.addresses_of_peer(peer_id));
|
|
list
|
|
}
|
|
|
|
fn inject_connected(&mut self, peer_id: PeerId, endpoint: ConnectedPoint) {
|
|
self.ping.inject_connected(peer_id.clone(), endpoint.clone());
|
|
self.identify.inject_connected(peer_id.clone(), endpoint.clone());
|
|
|
|
match self.nodes_info.entry(peer_id) {
|
|
Entry::Vacant(e) => {
|
|
e.insert(NodeInfo {
|
|
info_expire: None,
|
|
endpoint,
|
|
client_version: None,
|
|
latest_ping: None,
|
|
});
|
|
}
|
|
Entry::Occupied(e) => {
|
|
let e = e.into_mut();
|
|
if e.info_expire.as_ref().map(|exp| *exp < Instant::now()).unwrap_or(false) {
|
|
e.client_version = None;
|
|
e.latest_ping = None;
|
|
}
|
|
e.info_expire = None;
|
|
e.endpoint = endpoint;
|
|
}
|
|
}
|
|
}
|
|
|
|
fn inject_disconnected(&mut self, peer_id: &PeerId, endpoint: ConnectedPoint) {
|
|
self.ping.inject_disconnected(peer_id, endpoint.clone());
|
|
self.identify.inject_disconnected(peer_id, endpoint);
|
|
|
|
if let Some(entry) = self.nodes_info.get_mut(peer_id) {
|
|
entry.info_expire = Some(Instant::now() + CACHE_EXPIRE);
|
|
} else {
|
|
error!(target: "sub-libp2p",
|
|
"Disconnected from node we were not connected to {:?}", peer_id);
|
|
}
|
|
}
|
|
|
|
fn inject_node_event(
|
|
&mut self,
|
|
peer_id: PeerId,
|
|
event: <<Self::ProtocolsHandler as IntoProtocolsHandler>::Handler as ProtocolsHandler>::OutEvent
|
|
) {
|
|
match event {
|
|
EitherOutput::First(event) => self.ping.inject_node_event(peer_id, event),
|
|
EitherOutput::Second(event) => self.identify.inject_node_event(peer_id, event),
|
|
}
|
|
}
|
|
|
|
fn inject_replaced(&mut self, peer_id: PeerId, closed_endpoint: ConnectedPoint, new_endpoint: ConnectedPoint) {
|
|
self.ping.inject_replaced(peer_id.clone(), closed_endpoint.clone(), new_endpoint.clone());
|
|
self.identify.inject_replaced(peer_id.clone(), closed_endpoint, new_endpoint.clone());
|
|
|
|
if let Some(entry) = self.nodes_info.get_mut(&peer_id) {
|
|
entry.endpoint = new_endpoint;
|
|
} else {
|
|
error!(target: "sub-libp2p",
|
|
"Disconnected from node we were not connected to {:?}", peer_id);
|
|
}
|
|
}
|
|
|
|
fn inject_addr_reach_failure(&mut self, peer_id: Option<&PeerId>, addr: &Multiaddr, error: &dyn std::error::Error) {
|
|
self.ping.inject_addr_reach_failure(peer_id, addr, error);
|
|
self.identify.inject_addr_reach_failure(peer_id, addr, error);
|
|
}
|
|
|
|
fn inject_dial_failure(&mut self, peer_id: &PeerId) {
|
|
self.ping.inject_dial_failure(peer_id);
|
|
self.identify.inject_dial_failure(peer_id);
|
|
}
|
|
|
|
fn inject_new_listen_addr(&mut self, addr: &Multiaddr) {
|
|
self.ping.inject_new_listen_addr(addr);
|
|
self.identify.inject_new_listen_addr(addr);
|
|
}
|
|
|
|
fn inject_expired_listen_addr(&mut self, addr: &Multiaddr) {
|
|
self.ping.inject_expired_listen_addr(addr);
|
|
self.identify.inject_expired_listen_addr(addr);
|
|
}
|
|
|
|
fn inject_new_external_addr(&mut self, addr: &Multiaddr) {
|
|
self.ping.inject_new_external_addr(addr);
|
|
self.identify.inject_new_external_addr(addr);
|
|
}
|
|
|
|
fn poll(
|
|
&mut self,
|
|
params: &mut impl PollParameters
|
|
) -> Async<
|
|
NetworkBehaviourAction<
|
|
<<Self::ProtocolsHandler as IntoProtocolsHandler>::Handler as ProtocolsHandler>::InEvent,
|
|
Self::OutEvent
|
|
>
|
|
> {
|
|
loop {
|
|
match self.ping.poll(params) {
|
|
Async::NotReady => break,
|
|
Async::Ready(NetworkBehaviourAction::GenerateEvent(ev)) => {
|
|
if let PingEvent { peer, result: Ok(PingSuccess::Ping { rtt }) } = ev {
|
|
self.handle_ping_report(&peer, rtt)
|
|
}
|
|
},
|
|
Async::Ready(NetworkBehaviourAction::DialAddress { address }) =>
|
|
return Async::Ready(NetworkBehaviourAction::DialAddress { address }),
|
|
Async::Ready(NetworkBehaviourAction::DialPeer { peer_id }) =>
|
|
return Async::Ready(NetworkBehaviourAction::DialPeer { peer_id }),
|
|
Async::Ready(NetworkBehaviourAction::SendEvent { peer_id, event }) =>
|
|
return Async::Ready(NetworkBehaviourAction::SendEvent {
|
|
peer_id,
|
|
event: EitherOutput::First(event)
|
|
}),
|
|
Async::Ready(NetworkBehaviourAction::ReportObservedAddr { address }) =>
|
|
return Async::Ready(NetworkBehaviourAction::ReportObservedAddr { address }),
|
|
}
|
|
}
|
|
|
|
loop {
|
|
match self.identify.poll(params) {
|
|
Async::NotReady => break,
|
|
Async::Ready(NetworkBehaviourAction::GenerateEvent(event)) => {
|
|
match event {
|
|
IdentifyEvent::Received { peer_id, info, .. } => {
|
|
self.handle_identify_report(&peer_id, &info);
|
|
let event = DebugInfoEvent::Identified { peer_id, info };
|
|
return Async::Ready(NetworkBehaviourAction::GenerateEvent(event));
|
|
}
|
|
IdentifyEvent::Error { peer_id, error } =>
|
|
debug!(target: "sub-libp2p", "Identification with peer {:?} failed => {}", peer_id, error),
|
|
IdentifyEvent::Sent { .. } => {}
|
|
}
|
|
},
|
|
Async::Ready(NetworkBehaviourAction::DialAddress { address }) =>
|
|
return Async::Ready(NetworkBehaviourAction::DialAddress { address }),
|
|
Async::Ready(NetworkBehaviourAction::DialPeer { peer_id }) =>
|
|
return Async::Ready(NetworkBehaviourAction::DialPeer { peer_id }),
|
|
Async::Ready(NetworkBehaviourAction::SendEvent { peer_id, event }) =>
|
|
return Async::Ready(NetworkBehaviourAction::SendEvent {
|
|
peer_id,
|
|
event: EitherOutput::Second(event)
|
|
}),
|
|
Async::Ready(NetworkBehaviourAction::ReportObservedAddr { address }) =>
|
|
return Async::Ready(NetworkBehaviourAction::ReportObservedAddr { address }),
|
|
}
|
|
}
|
|
|
|
while let Ok(Async::Ready(Some(_))) = self.garbage_collect.poll() {
|
|
self.nodes_info.retain(|_, node| {
|
|
node.info_expire.as_ref().map(|exp| *exp >= Instant::now()).unwrap_or(true)
|
|
});
|
|
}
|
|
|
|
Async::NotReady
|
|
}
|
|
}
|