Merge branch 'master' into txcount-rpc
Conflicts: rpc/src/v1/tests/mocked/ethcore.rs
This commit is contained in:
commit
a8bc86151e
4
Cargo.lock
generated
4
Cargo.lock
generated
@ -1103,7 +1103,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
|
|||||||
[[package]]
|
[[package]]
|
||||||
name = "rocksdb"
|
name = "rocksdb"
|
||||||
version = "0.4.5"
|
version = "0.4.5"
|
||||||
source = "git+https://github.com/ethcore/rust-rocksdb#9140e37ce0fdb748097f85653c01b0f7e3736ea9"
|
source = "git+https://github.com/ethcore/rust-rocksdb#e0e6c099d8cd156fe446009fce241d57b00cd8f4"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"libc 0.2.12 (registry+https://github.com/rust-lang/crates.io-index)",
|
"libc 0.2.12 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||||
"rocksdb-sys 0.3.0 (git+https://github.com/ethcore/rust-rocksdb)",
|
"rocksdb-sys 0.3.0 (git+https://github.com/ethcore/rust-rocksdb)",
|
||||||
@ -1112,7 +1112,7 @@ dependencies = [
|
|||||||
[[package]]
|
[[package]]
|
||||||
name = "rocksdb-sys"
|
name = "rocksdb-sys"
|
||||||
version = "0.3.0"
|
version = "0.3.0"
|
||||||
source = "git+https://github.com/ethcore/rust-rocksdb#9140e37ce0fdb748097f85653c01b0f7e3736ea9"
|
source = "git+https://github.com/ethcore/rust-rocksdb#e0e6c099d8cd156fe446009fce241d57b00cd8f4"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"gcc 0.3.28 (registry+https://github.com/rust-lang/crates.io-index)",
|
"gcc 0.3.28 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||||
"libc 0.2.12 (registry+https://github.com/rust-lang/crates.io-index)",
|
"libc 0.2.12 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||||
|
@ -686,14 +686,15 @@ impl TransactionQueue {
|
|||||||
if let Some(order) = self.future.drop(&address, &nonce) {
|
if let Some(order) = self.future.drop(&address, &nonce) {
|
||||||
// Let's insert that transaction to current (if it has higher gas_price)
|
// Let's insert that transaction to current (if it has higher gas_price)
|
||||||
let future_tx = self.by_hash.remove(&order.hash).unwrap();
|
let future_tx = self.by_hash.remove(&order.hash).unwrap();
|
||||||
try!(check_too_cheap(Self::replace_transaction(future_tx, state_nonce, &mut self.current, &mut self.by_hash)));
|
// if transaction in `current` (then one we are importing) is replaced it means that it has to low gas_price
|
||||||
|
try!(check_too_cheap(!Self::replace_transaction(future_tx, state_nonce, &mut self.current, &mut self.by_hash)));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Also enforce the limit
|
// Also enforce the limit
|
||||||
let removed = self.current.enforce_limit(&mut self.by_hash);
|
let removed = self.current.enforce_limit(&mut self.by_hash);
|
||||||
// If some transaction were removed because of limit we need to update last_nonces also.
|
// If some transaction were removed because of limit we need to update last_nonces also.
|
||||||
self.update_last_nonces(&removed);
|
self.update_last_nonces(&removed);
|
||||||
// Trigger error if we were removed.
|
// Trigger error if the transaction we are importing was removed.
|
||||||
try!(check_if_removed(&address, &nonce, removed));
|
try!(check_if_removed(&address, &nonce, removed));
|
||||||
|
|
||||||
trace!(target: "miner", "status: {:?}", self.status());
|
trace!(target: "miner", "status: {:?}", self.status());
|
||||||
@ -937,7 +938,7 @@ mod test {
|
|||||||
let res = txq.add(tx2.clone(), &default_nonce, TransactionOrigin::External);
|
let res = txq.add(tx2.clone(), &default_nonce, TransactionOrigin::External);
|
||||||
|
|
||||||
// and then there should be only one transaction in current (the one with higher gas_price)
|
// and then there should be only one transaction in current (the one with higher gas_price)
|
||||||
assert_eq!(unwrap_tx_err(res), TransactionError::TooCheapToReplace);
|
assert_eq!(res.unwrap(), TransactionImportResult::Current);
|
||||||
assert_eq!(txq.status().pending, 1);
|
assert_eq!(txq.status().pending, 1);
|
||||||
assert_eq!(txq.status().future, 0);
|
assert_eq!(txq.status().future, 0);
|
||||||
assert_eq!(txq.current.by_priority.len(), 1);
|
assert_eq!(txq.current.by_priority.len(), 1);
|
||||||
|
@ -65,8 +65,8 @@ impl Keccak256<[u8; 32]> for [u8] {
|
|||||||
|
|
||||||
/// AES encryption
|
/// AES encryption
|
||||||
pub mod aes {
|
pub mod aes {
|
||||||
use rcrypto::blockmodes::CtrMode;
|
use rcrypto::blockmodes::{CtrMode, CbcDecryptor, PkcsPadding};
|
||||||
use rcrypto::aessafe::AesSafe128Encryptor;
|
use rcrypto::aessafe::{AesSafe128Encryptor, AesSafe128Decryptor};
|
||||||
use rcrypto::symmetriccipher::{Encryptor, Decryptor};
|
use rcrypto::symmetriccipher::{Encryptor, Decryptor};
|
||||||
use rcrypto::buffer::{RefReadBuffer, RefWriteBuffer};
|
use rcrypto::buffer::{RefReadBuffer, RefWriteBuffer};
|
||||||
|
|
||||||
@ -81,5 +81,12 @@ pub mod aes {
|
|||||||
let mut encryptor = CtrMode::new(AesSafe128Encryptor::new(k), iv.to_vec());
|
let mut encryptor = CtrMode::new(AesSafe128Encryptor::new(k), iv.to_vec());
|
||||||
encryptor.decrypt(&mut RefReadBuffer::new(encrypted), &mut RefWriteBuffer::new(dest), true).expect("Invalid length or padding");
|
encryptor.decrypt(&mut RefReadBuffer::new(encrypted), &mut RefWriteBuffer::new(dest), true).expect("Invalid length or padding");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Decrypt a message using cbc mode
|
||||||
|
pub fn decrypt_cbc(k: &[u8], iv: &[u8], encrypted: &[u8], dest: &mut [u8]) {
|
||||||
|
let mut encryptor = CbcDecryptor::new(AesSafe128Decryptor::new(k), PkcsPadding, iv.to_vec());
|
||||||
|
encryptor.decrypt(&mut RefReadBuffer::new(encrypted), &mut RefWriteBuffer::new(dest), true).expect("Invalid length or padding");
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -31,3 +31,11 @@ impl From<json::H160> for Address {
|
|||||||
From::from(a)
|
From::from(a)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl<'a> From<&'a json::H160> for Address {
|
||||||
|
fn from(json: &'a json::H160) -> Self {
|
||||||
|
let mut a = [0u8; 20];
|
||||||
|
a.copy_from_slice(json);
|
||||||
|
From::from(a)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -14,6 +14,8 @@
|
|||||||
// You should have received a copy of the GNU General Public License
|
// You should have received a copy of the GNU General Public License
|
||||||
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
use std::fmt;
|
||||||
|
use std::ops;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
use rustc_serialize::hex::{FromHex, ToHex};
|
use rustc_serialize::hex::{FromHex, ToHex};
|
||||||
use serde::{Serialize, Serializer, Deserialize, Deserializer, Error as SerdeError};
|
use serde::{Serialize, Serializer, Deserialize, Deserializer, Error as SerdeError};
|
||||||
@ -22,9 +24,31 @@ use super::Error;
|
|||||||
|
|
||||||
macro_rules! impl_hash {
|
macro_rules! impl_hash {
|
||||||
($name: ident, $size: expr) => {
|
($name: ident, $size: expr) => {
|
||||||
#[derive(Debug, PartialEq)]
|
|
||||||
pub struct $name([u8; $size]);
|
pub struct $name([u8; $size]);
|
||||||
|
|
||||||
|
impl fmt::Debug for $name {
|
||||||
|
fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> {
|
||||||
|
let self_ref: &[u8] = &self.0;
|
||||||
|
write!(f, "{:?}", self_ref)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PartialEq for $name {
|
||||||
|
fn eq(&self, other: &Self) -> bool {
|
||||||
|
let self_ref: &[u8] = &self.0;
|
||||||
|
let other_ref: &[u8] = &other.0;
|
||||||
|
self_ref == other_ref
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl ops::Deref for $name {
|
||||||
|
type Target = [u8];
|
||||||
|
|
||||||
|
fn deref(&self) -> &Self::Target {
|
||||||
|
&self.0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
impl Serialize for $name {
|
impl Serialize for $name {
|
||||||
fn serialize<S>(&self, serializer: &mut S) -> Result<(), S::Error>
|
fn serialize<S>(&self, serializer: &mut S) -> Result<(), S::Error>
|
||||||
where S: Serializer {
|
where S: Serializer {
|
||||||
@ -85,3 +109,4 @@ macro_rules! impl_hash {
|
|||||||
impl_hash!(H128, 16);
|
impl_hash!(H128, 16);
|
||||||
impl_hash!(H160, 20);
|
impl_hash!(H160, 20);
|
||||||
impl_hash!(H256, 32);
|
impl_hash!(H256, 32);
|
||||||
|
impl_hash!(H768, 96);
|
||||||
|
@ -5,14 +5,16 @@ mod hash;
|
|||||||
mod id;
|
mod id;
|
||||||
mod kdf;
|
mod kdf;
|
||||||
mod key_file;
|
mod key_file;
|
||||||
|
mod presale;
|
||||||
mod version;
|
mod version;
|
||||||
|
|
||||||
pub use self::cipher::{Cipher, CipherSer, CipherSerParams, Aes128Ctr};
|
pub use self::cipher::{Cipher, CipherSer, CipherSerParams, Aes128Ctr};
|
||||||
pub use self::crypto::Crypto;
|
pub use self::crypto::Crypto;
|
||||||
pub use self::error::Error;
|
pub use self::error::Error;
|
||||||
pub use self::hash::{H128, H160, H256};
|
pub use self::hash::{H128, H160, H256, H768};
|
||||||
pub use self::id::UUID;
|
pub use self::id::UUID;
|
||||||
pub use self::kdf::{Kdf, KdfSer, Prf, Pbkdf2, Scrypt, KdfSerParams};
|
pub use self::kdf::{Kdf, KdfSer, Prf, Pbkdf2, Scrypt, KdfSerParams};
|
||||||
pub use self::key_file::KeyFile;
|
pub use self::key_file::KeyFile;
|
||||||
|
pub use self::presale::PresaleWallet;
|
||||||
pub use self::version::Version;
|
pub use self::version::Version;
|
||||||
|
|
||||||
|
42
ethstore/src/json/presale.rs
Normal file
42
ethstore/src/json/presale.rs
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
use std::io::Read;
|
||||||
|
use serde_json;
|
||||||
|
use super::{H160, H768};
|
||||||
|
|
||||||
|
#[derive(Debug, PartialEq, Deserialize)]
|
||||||
|
pub struct PresaleWallet {
|
||||||
|
pub encseed: H768,
|
||||||
|
#[serde(rename = "ethaddr")]
|
||||||
|
pub address: H160,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PresaleWallet {
|
||||||
|
pub fn load<R>(reader: R) -> Result<Self, serde_json::Error> where R: Read {
|
||||||
|
serde_json::from_reader(reader)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use std::str::FromStr;
|
||||||
|
use serde_json;
|
||||||
|
use json::{PresaleWallet, H160, H768};
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn presale_wallet() {
|
||||||
|
let json = r#"
|
||||||
|
{
|
||||||
|
"encseed": "137103c28caeebbcea5d7f95edb97a289ded151b72159137cb7b2671f394f54cff8c121589dcb373e267225547b3c71cbdb54f6e48ec85cd549f96cf0dedb3bc0a9ac6c79b9c426c5878ca2c9d06ff42a23cb648312fc32ba83649de0928e066",
|
||||||
|
"ethaddr": "ede84640d1a1d3e06902048e67aa7db8d52c2ce1",
|
||||||
|
"email": "123@gmail.com",
|
||||||
|
"btcaddr": "1JvqEc6WLhg6GnyrLBe2ztPAU28KRfuseH"
|
||||||
|
} "#;
|
||||||
|
|
||||||
|
let expected = PresaleWallet {
|
||||||
|
encseed: H768::from_str("137103c28caeebbcea5d7f95edb97a289ded151b72159137cb7b2671f394f54cff8c121589dcb373e267225547b3c71cbdb54f6e48ec85cd549f96cf0dedb3bc0a9ac6c79b9c426c5878ca2c9d06ff42a23cb648312fc32ba83649de0928e066").unwrap(),
|
||||||
|
address: H160::from_str("ede84640d1a1d3e06902048e67aa7db8d52c2ce1").unwrap(),
|
||||||
|
};
|
||||||
|
|
||||||
|
let wallet: PresaleWallet = serde_json::from_str(json).unwrap();
|
||||||
|
assert_eq!(expected, wallet);
|
||||||
|
}
|
||||||
|
}
|
@ -37,6 +37,7 @@ mod crypto;
|
|||||||
mod error;
|
mod error;
|
||||||
mod ethstore;
|
mod ethstore;
|
||||||
mod import;
|
mod import;
|
||||||
|
mod presale;
|
||||||
mod random;
|
mod random;
|
||||||
mod secret_store;
|
mod secret_store;
|
||||||
|
|
||||||
@ -44,5 +45,6 @@ pub use self::account::SafeAccount;
|
|||||||
pub use self::error::Error;
|
pub use self::error::Error;
|
||||||
pub use self::ethstore::EthStore;
|
pub use self::ethstore::EthStore;
|
||||||
pub use self::import::import_accounts;
|
pub use self::import::import_accounts;
|
||||||
|
pub use self::presale::PresaleWallet;
|
||||||
pub use self::secret_store::SecretStore;
|
pub use self::secret_store::SecretStore;
|
||||||
|
|
||||||
|
80
ethstore/src/presale.rs
Normal file
80
ethstore/src/presale.rs
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
use std::fs;
|
||||||
|
use std::path::Path;
|
||||||
|
use rcrypto::pbkdf2::pbkdf2;
|
||||||
|
use rcrypto::sha2::Sha256;
|
||||||
|
use rcrypto::hmac::Hmac;
|
||||||
|
use json;
|
||||||
|
use ethkey::{Address, Secret, KeyPair};
|
||||||
|
use crypto::Keccak256;
|
||||||
|
use {crypto, Error};
|
||||||
|
|
||||||
|
pub struct PresaleWallet {
|
||||||
|
iv: [u8; 16],
|
||||||
|
ciphertext: [u8; 80],
|
||||||
|
address: Address,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<json::PresaleWallet> for PresaleWallet {
|
||||||
|
fn from(wallet: json::PresaleWallet) -> Self {
|
||||||
|
let mut iv = [0u8; 16];
|
||||||
|
iv.copy_from_slice(&wallet.encseed[..16]);
|
||||||
|
|
||||||
|
let mut ciphertext = [0u8; 80];
|
||||||
|
ciphertext.copy_from_slice(&wallet.encseed[16..]);
|
||||||
|
|
||||||
|
PresaleWallet {
|
||||||
|
iv: iv,
|
||||||
|
ciphertext: ciphertext,
|
||||||
|
address: Address::from(wallet.address),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PresaleWallet {
|
||||||
|
pub fn open<P>(path: P) -> Result<Self, Error> where P: AsRef<Path> {
|
||||||
|
let file = try!(fs::File::open(path));
|
||||||
|
let presale = json::PresaleWallet::load(file).unwrap();
|
||||||
|
Ok(PresaleWallet::from(presale))
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn decrypt(&self, password: &str) -> Result<KeyPair, Error> {
|
||||||
|
let mut h_mac = Hmac::new(Sha256::new(), password.as_bytes());
|
||||||
|
let mut derived_key = vec![0u8; 16];
|
||||||
|
pbkdf2(&mut h_mac, password.as_bytes(), 2000, &mut derived_key);
|
||||||
|
|
||||||
|
let mut key = [0u8; 64];
|
||||||
|
crypto::aes::decrypt_cbc(&derived_key, &self.iv, &self.ciphertext, &mut key);
|
||||||
|
|
||||||
|
let secret = Secret::from(key.keccak256());
|
||||||
|
if let Ok(kp) = KeyPair::from_secret(secret) {
|
||||||
|
if kp.address() == self.address {
|
||||||
|
return Ok(kp)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Err(Error::InvalidPassword)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use ethkey::Address;
|
||||||
|
use super::PresaleWallet;
|
||||||
|
use json;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test() {
|
||||||
|
let json = r#"
|
||||||
|
{
|
||||||
|
"encseed": "137103c28caeebbcea5d7f95edb97a289ded151b72159137cb7b2671f394f54cff8c121589dcb373e267225547b3c71cbdb54f6e48ec85cd549f96cf0dedb3bc0a9ac6c79b9c426c5878ca2c9d06ff42a23cb648312fc32ba83649de0928e066",
|
||||||
|
"ethaddr": "ede84640d1a1d3e06902048e67aa7db8d52c2ce1",
|
||||||
|
"email": "123@gmail.com",
|
||||||
|
"btcaddr": "1JvqEc6WLhg6GnyrLBe2ztPAU28KRfuseH"
|
||||||
|
} "#;
|
||||||
|
|
||||||
|
let wallet = json::PresaleWallet::load(json.as_bytes()).unwrap();
|
||||||
|
let wallet = PresaleWallet::from(wallet);
|
||||||
|
let kp = wallet.decrypt("123").unwrap();
|
||||||
|
assert_eq!(kp.address(), Address::from(wallet.address));
|
||||||
|
}
|
||||||
|
}
|
@ -199,7 +199,10 @@ impl Configuration {
|
|||||||
net_path.push("network");
|
net_path.push("network");
|
||||||
ret.config_path = Some(net_path.to_str().unwrap().to_owned());
|
ret.config_path = Some(net_path.to_str().unwrap().to_owned());
|
||||||
ret.reserved_nodes = self.init_reserved_nodes();
|
ret.reserved_nodes = self.init_reserved_nodes();
|
||||||
ret.reserved_only = self.args.flag_reserved_only;
|
|
||||||
|
if self.args.flag_reserved_only {
|
||||||
|
ret.non_reserved_mode = ::util::network::NonReservedPeerMode::Deny;
|
||||||
|
}
|
||||||
ret
|
ret
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -230,6 +230,7 @@ fn execute_client(conf: Configuration, spec: Spec, client_config: ClientConfig)
|
|||||||
logger: logger.clone(),
|
logger: logger.clone(),
|
||||||
settings: network_settings.clone(),
|
settings: network_settings.clone(),
|
||||||
allow_pending_receipt_query: !conf.args.flag_geth,
|
allow_pending_receipt_query: !conf.args.flag_geth,
|
||||||
|
net_service: service.network(),
|
||||||
});
|
});
|
||||||
|
|
||||||
let dependencies = rpc::Dependencies {
|
let dependencies = rpc::Dependencies {
|
||||||
@ -315,11 +316,11 @@ fn execute_export(conf: Configuration) {
|
|||||||
udp_port: None,
|
udp_port: None,
|
||||||
nat_enabled: false,
|
nat_enabled: false,
|
||||||
discovery_enabled: false,
|
discovery_enabled: false,
|
||||||
reserved_only: true,
|
|
||||||
boot_nodes: Vec::new(),
|
boot_nodes: Vec::new(),
|
||||||
use_secret: None,
|
use_secret: None,
|
||||||
ideal_peers: 0,
|
ideal_peers: 0,
|
||||||
reserved_nodes: Vec::new(),
|
reserved_nodes: Vec::new(),
|
||||||
|
non_reserved_mode: ::util::network::NonReservedPeerMode::Accept,
|
||||||
};
|
};
|
||||||
let client_config = conf.client_config(&spec);
|
let client_config = conf.client_config(&spec);
|
||||||
|
|
||||||
@ -387,11 +388,11 @@ fn execute_import(conf: Configuration) {
|
|||||||
udp_port: None,
|
udp_port: None,
|
||||||
nat_enabled: false,
|
nat_enabled: false,
|
||||||
discovery_enabled: false,
|
discovery_enabled: false,
|
||||||
reserved_only: true,
|
|
||||||
boot_nodes: Vec::new(),
|
boot_nodes: Vec::new(),
|
||||||
use_secret: None,
|
use_secret: None,
|
||||||
ideal_peers: 0,
|
ideal_peers: 0,
|
||||||
reserved_nodes: Vec::new(),
|
reserved_nodes: Vec::new(),
|
||||||
|
non_reserved_mode: ::util::network::NonReservedPeerMode::Accept,
|
||||||
};
|
};
|
||||||
let client_config = conf.client_config(&spec);
|
let client_config = conf.client_config(&spec);
|
||||||
|
|
||||||
|
@ -25,6 +25,7 @@ use ethcore::client::Client;
|
|||||||
use util::RotatingLogger;
|
use util::RotatingLogger;
|
||||||
use ethcore::account_provider::AccountProvider;
|
use ethcore::account_provider::AccountProvider;
|
||||||
use util::network_settings::NetworkSettings;
|
use util::network_settings::NetworkSettings;
|
||||||
|
use util::network::NetworkService;
|
||||||
|
|
||||||
#[cfg(feature="rpc")]
|
#[cfg(feature="rpc")]
|
||||||
pub use ethcore_rpc::ConfirmationsQueue;
|
pub use ethcore_rpc::ConfirmationsQueue;
|
||||||
@ -89,6 +90,7 @@ pub struct Dependencies {
|
|||||||
pub logger: Arc<RotatingLogger>,
|
pub logger: Arc<RotatingLogger>,
|
||||||
pub settings: Arc<NetworkSettings>,
|
pub settings: Arc<NetworkSettings>,
|
||||||
pub allow_pending_receipt_query: bool,
|
pub allow_pending_receipt_query: bool,
|
||||||
|
pub net_service: Arc<NetworkService<::ethcore::service::SyncMessage>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
fn to_modules(apis: &[Api]) -> BTreeMap<String, String> {
|
fn to_modules(apis: &[Api]) -> BTreeMap<String, String> {
|
||||||
@ -164,7 +166,7 @@ pub fn setup_rpc<T: Extendable>(server: T, deps: Arc<Dependencies>, apis: ApiSet
|
|||||||
server.add_delegate(EthcoreClient::new(&deps.client, &deps.miner, deps.logger.clone(), deps.settings.clone(), queue).to_delegate())
|
server.add_delegate(EthcoreClient::new(&deps.client, &deps.miner, deps.logger.clone(), deps.settings.clone(), queue).to_delegate())
|
||||||
},
|
},
|
||||||
Api::EthcoreSet => {
|
Api::EthcoreSet => {
|
||||||
server.add_delegate(EthcoreSetClient::new(&deps.miner).to_delegate())
|
server.add_delegate(EthcoreSetClient::new(&deps.miner, &deps.net_service).to_delegate())
|
||||||
},
|
},
|
||||||
Api::Traces => {
|
Api::Traces => {
|
||||||
server.add_delegate(TracesClient::new(&deps.client, &deps.miner).to_delegate())
|
server.add_delegate(TracesClient::new(&deps.client, &deps.miner).to_delegate())
|
||||||
|
@ -16,9 +16,11 @@
|
|||||||
|
|
||||||
/// Ethcore-specific rpc interface for operations altering the settings.
|
/// Ethcore-specific rpc interface for operations altering the settings.
|
||||||
use util::{U256, Address};
|
use util::{U256, Address};
|
||||||
|
use util::network::{NetworkService, NonReservedPeerMode};
|
||||||
use std::sync::{Arc, Weak};
|
use std::sync::{Arc, Weak};
|
||||||
use jsonrpc_core::*;
|
use jsonrpc_core::*;
|
||||||
use ethcore::miner::MinerService;
|
use ethcore::miner::MinerService;
|
||||||
|
use ethcore::service::SyncMessage;
|
||||||
use v1::traits::EthcoreSet;
|
use v1::traits::EthcoreSet;
|
||||||
use v1::types::{Bytes};
|
use v1::types::{Bytes};
|
||||||
|
|
||||||
@ -27,13 +29,15 @@ pub struct EthcoreSetClient<M> where
|
|||||||
M: MinerService {
|
M: MinerService {
|
||||||
|
|
||||||
miner: Weak<M>,
|
miner: Weak<M>,
|
||||||
|
net: Weak<NetworkService<SyncMessage>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<M> EthcoreSetClient<M> where M: MinerService {
|
impl<M> EthcoreSetClient<M> where M: MinerService {
|
||||||
/// Creates new `EthcoreSetClient`.
|
/// Creates new `EthcoreSetClient`.
|
||||||
pub fn new(miner: &Arc<M>) -> Self {
|
pub fn new(miner: &Arc<M>, net: &Arc<NetworkService<SyncMessage>>) -> Self {
|
||||||
EthcoreSetClient {
|
EthcoreSetClient {
|
||||||
miner: Arc::downgrade(miner),
|
miner: Arc::downgrade(miner),
|
||||||
|
net: Arc::downgrade(net),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -74,4 +78,32 @@ impl<M> EthcoreSet for EthcoreSetClient<M> where M: MinerService + 'static {
|
|||||||
to_value(&true)
|
to_value(&true)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn add_reserved_peer(&self, params: Params) -> Result<Value, Error> {
|
||||||
|
from_params::<(String,)>(params).and_then(|(peer,)| {
|
||||||
|
match take_weak!(self.net).add_reserved_peer(&peer) {
|
||||||
|
Ok(()) => to_value(&true),
|
||||||
|
Err(_) => Err(Error::invalid_params()),
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn remove_reserved_peer(&self, params: Params) -> Result<Value, Error> {
|
||||||
|
from_params::<(String,)>(params).and_then(|(peer,)| {
|
||||||
|
match take_weak!(self.net).remove_reserved_peer(&peer) {
|
||||||
|
Ok(()) => to_value(&true),
|
||||||
|
Err(_) => Err(Error::invalid_params()),
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn drop_non_reserved_peers(&self, _: Params) -> Result<Value, Error> {
|
||||||
|
take_weak!(self.net).set_non_reserved_mode(NonReservedPeerMode::Deny);
|
||||||
|
to_value(&true)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn accept_non_reserved_peers(&self, _: Params) -> Result<Value, Error> {
|
||||||
|
take_weak!(self.net).set_non_reserved_mode(NonReservedPeerMode::Accept);
|
||||||
|
to_value(&true)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -132,6 +132,7 @@ fn rpc_ethcore_dev_logs_levels() {
|
|||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_devLogsLevels", "params":[], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_devLogsLevels", "params":[], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":"rpc=trace","id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":"rpc=trace","id":1}"#;
|
||||||
|
|
||||||
assert_eq!(io.handle_request(request), Some(response.to_owned()));
|
assert_eq!(io.handle_request(request), Some(response.to_owned()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -19,23 +19,30 @@ use std::str::FromStr;
|
|||||||
use jsonrpc_core::IoHandler;
|
use jsonrpc_core::IoHandler;
|
||||||
use v1::{EthcoreSet, EthcoreSetClient};
|
use v1::{EthcoreSet, EthcoreSetClient};
|
||||||
use ethcore::miner::MinerService;
|
use ethcore::miner::MinerService;
|
||||||
|
use ethcore::service::SyncMessage;
|
||||||
use v1::tests::helpers::TestMinerService;
|
use v1::tests::helpers::TestMinerService;
|
||||||
use util::numbers::*;
|
use util::numbers::*;
|
||||||
|
use util::network::{NetworkConfiguration, NetworkService};
|
||||||
use rustc_serialize::hex::FromHex;
|
use rustc_serialize::hex::FromHex;
|
||||||
|
|
||||||
fn miner_service() -> Arc<TestMinerService> {
|
fn miner_service() -> Arc<TestMinerService> {
|
||||||
Arc::new(TestMinerService::default())
|
Arc::new(TestMinerService::default())
|
||||||
}
|
}
|
||||||
|
|
||||||
fn ethcore_set_client(miner: &Arc<TestMinerService>) -> EthcoreSetClient<TestMinerService> {
|
fn network_service() -> Arc<NetworkService<SyncMessage>> {
|
||||||
EthcoreSetClient::new(miner)
|
Arc::new(NetworkService::new(NetworkConfiguration::new()).unwrap())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn ethcore_set_client(miner: &Arc<TestMinerService>, net: &Arc<NetworkService<SyncMessage>>) -> EthcoreSetClient<TestMinerService> {
|
||||||
|
EthcoreSetClient::new(miner, net)
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn rpc_ethcore_set_min_gas_price() {
|
fn rpc_ethcore_set_min_gas_price() {
|
||||||
let miner = miner_service();
|
let miner = miner_service();
|
||||||
|
let network = network_service();
|
||||||
let io = IoHandler::new();
|
let io = IoHandler::new();
|
||||||
io.add_delegate(ethcore_set_client(&miner).to_delegate());
|
io.add_delegate(ethcore_set_client(&miner, &network).to_delegate());
|
||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setMinGasPrice", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setMinGasPrice", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
||||||
@ -46,8 +53,9 @@ fn rpc_ethcore_set_min_gas_price() {
|
|||||||
#[test]
|
#[test]
|
||||||
fn rpc_ethcore_set_gas_floor_target() {
|
fn rpc_ethcore_set_gas_floor_target() {
|
||||||
let miner = miner_service();
|
let miner = miner_service();
|
||||||
|
let network = network_service();
|
||||||
let io = IoHandler::new();
|
let io = IoHandler::new();
|
||||||
io.add_delegate(ethcore_set_client(&miner).to_delegate());
|
io.add_delegate(ethcore_set_client(&miner, &network).to_delegate());
|
||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setGasFloorTarget", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setGasFloorTarget", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
||||||
@ -59,8 +67,9 @@ fn rpc_ethcore_set_gas_floor_target() {
|
|||||||
#[test]
|
#[test]
|
||||||
fn rpc_ethcore_set_extra_data() {
|
fn rpc_ethcore_set_extra_data() {
|
||||||
let miner = miner_service();
|
let miner = miner_service();
|
||||||
|
let network = network_service();
|
||||||
let io = IoHandler::new();
|
let io = IoHandler::new();
|
||||||
io.add_delegate(ethcore_set_client(&miner).to_delegate());
|
io.add_delegate(ethcore_set_client(&miner, &network).to_delegate());
|
||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setExtraData", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setExtraData", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
||||||
@ -72,8 +81,9 @@ fn rpc_ethcore_set_extra_data() {
|
|||||||
#[test]
|
#[test]
|
||||||
fn rpc_ethcore_set_author() {
|
fn rpc_ethcore_set_author() {
|
||||||
let miner = miner_service();
|
let miner = miner_service();
|
||||||
|
let network = network_service();
|
||||||
let io = IoHandler::new();
|
let io = IoHandler::new();
|
||||||
io.add_delegate(ethcore_set_client(&miner).to_delegate());
|
io.add_delegate(ethcore_set_client(&miner, &network).to_delegate());
|
||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setAuthor", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setAuthor", "params":["0xcd1722f3947def4cf144679da39c4c32bdc35681"], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
||||||
@ -85,8 +95,9 @@ fn rpc_ethcore_set_author() {
|
|||||||
#[test]
|
#[test]
|
||||||
fn rpc_ethcore_set_transactions_limit() {
|
fn rpc_ethcore_set_transactions_limit() {
|
||||||
let miner = miner_service();
|
let miner = miner_service();
|
||||||
|
let network = network_service();
|
||||||
let io = IoHandler::new();
|
let io = IoHandler::new();
|
||||||
io.add_delegate(ethcore_set_client(&miner).to_delegate());
|
io.add_delegate(ethcore_set_client(&miner, &network).to_delegate());
|
||||||
|
|
||||||
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setTransactionsLimit", "params":[10240240], "id": 1}"#;
|
let request = r#"{"jsonrpc": "2.0", "method": "ethcore_setTransactionsLimit", "params":[10240240], "id": 1}"#;
|
||||||
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
let response = r#"{"jsonrpc":"2.0","result":true,"id":1}"#;
|
||||||
|
@ -37,6 +37,18 @@ pub trait EthcoreSet: Sized + Send + Sync + 'static {
|
|||||||
/// Sets the limits for transaction queue.
|
/// Sets the limits for transaction queue.
|
||||||
fn set_transactions_limit(&self, _: Params) -> Result<Value, Error>;
|
fn set_transactions_limit(&self, _: Params) -> Result<Value, Error>;
|
||||||
|
|
||||||
|
/// Add a reserved peer.
|
||||||
|
fn add_reserved_peer(&self, _: Params) -> Result<Value, Error>;
|
||||||
|
|
||||||
|
/// Remove a reserved peer.
|
||||||
|
fn remove_reserved_peer(&self, _: Params) -> Result<Value, Error>;
|
||||||
|
|
||||||
|
/// Drop all non-reserved peers.
|
||||||
|
fn drop_non_reserved_peers(&self, _: Params) -> Result<Value, Error>;
|
||||||
|
|
||||||
|
/// Accept non-reserved peers (default behavior)
|
||||||
|
fn accept_non_reserved_peers(&self, _: Params) -> Result<Value, Error>;
|
||||||
|
|
||||||
/// Should be used to convert object to io delegate.
|
/// Should be used to convert object to io delegate.
|
||||||
fn to_delegate(self) -> IoDelegate<Self> {
|
fn to_delegate(self) -> IoDelegate<Self> {
|
||||||
let mut delegate = IoDelegate::new(Arc::new(self));
|
let mut delegate = IoDelegate::new(Arc::new(self));
|
||||||
@ -45,6 +57,10 @@ pub trait EthcoreSet: Sized + Send + Sync + 'static {
|
|||||||
delegate.add_method("ethcore_setExtraData", EthcoreSet::set_extra_data);
|
delegate.add_method("ethcore_setExtraData", EthcoreSet::set_extra_data);
|
||||||
delegate.add_method("ethcore_setAuthor", EthcoreSet::set_author);
|
delegate.add_method("ethcore_setAuthor", EthcoreSet::set_author);
|
||||||
delegate.add_method("ethcore_setTransactionsLimit", EthcoreSet::set_transactions_limit);
|
delegate.add_method("ethcore_setTransactionsLimit", EthcoreSet::set_transactions_limit);
|
||||||
|
delegate.add_method("ethcore_addReservedPeer", EthcoreSet::add_reserved_peer);
|
||||||
|
delegate.add_method("ethcore_removeReservedPeer", EthcoreSet::remove_reserved_peer);
|
||||||
|
delegate.add_method("ethcore_dropNonReservedPeers", EthcoreSet::drop_non_reserved_peers);
|
||||||
|
delegate.add_method("ethcore_acceptNonReservedPeers", EthcoreSet::accept_non_reserved_peers);
|
||||||
|
|
||||||
delegate
|
delegate
|
||||||
}
|
}
|
||||||
|
@ -20,6 +20,9 @@ use std::default::Default;
|
|||||||
use rocksdb::{DB, Writable, WriteBatch, IteratorMode, DBVector, DBIterator,
|
use rocksdb::{DB, Writable, WriteBatch, IteratorMode, DBVector, DBIterator,
|
||||||
IndexType, Options, DBCompactionStyle, BlockBasedOptions, Direction};
|
IndexType, Options, DBCompactionStyle, BlockBasedOptions, Direction};
|
||||||
|
|
||||||
|
const DB_FILE_SIZE_BASE: u64 = 10 * 1024 * 1024;
|
||||||
|
const DB_FILE_SIZE_MULTIPLIER: i32 = 5;
|
||||||
|
|
||||||
/// Write transaction. Batches a sequence of put/delete operations for efficiency.
|
/// Write transaction. Batches a sequence of put/delete operations for efficiency.
|
||||||
pub struct DBTransaction {
|
pub struct DBTransaction {
|
||||||
batch: WriteBatch,
|
batch: WriteBatch,
|
||||||
@ -64,7 +67,7 @@ impl DatabaseConfig {
|
|||||||
DatabaseConfig {
|
DatabaseConfig {
|
||||||
cache_size: Some(cache_size),
|
cache_size: Some(cache_size),
|
||||||
prefix_size: None,
|
prefix_size: None,
|
||||||
max_open_files: 256
|
max_open_files: -1,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -74,7 +77,7 @@ impl Default for DatabaseConfig {
|
|||||||
DatabaseConfig {
|
DatabaseConfig {
|
||||||
cache_size: None,
|
cache_size: None,
|
||||||
prefix_size: None,
|
prefix_size: None,
|
||||||
max_open_files: 256
|
max_open_files: -1,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -110,6 +113,8 @@ impl Database {
|
|||||||
opts.create_if_missing(true);
|
opts.create_if_missing(true);
|
||||||
opts.set_use_fsync(false);
|
opts.set_use_fsync(false);
|
||||||
opts.set_compaction_style(DBCompactionStyle::DBUniversalCompaction);
|
opts.set_compaction_style(DBCompactionStyle::DBUniversalCompaction);
|
||||||
|
opts.set_target_file_size_base(DB_FILE_SIZE_BASE);
|
||||||
|
opts.set_target_file_size_multiplier(DB_FILE_SIZE_MULTIPLIER);
|
||||||
if let Some(cache_size) = config.cache_size {
|
if let Some(cache_size) = config.cache_size {
|
||||||
// half goes to read cache
|
// half goes to read cache
|
||||||
opts.set_block_cache_size_mb(cache_size as u64 / 2);
|
opts.set_block_cache_size_mb(cache_size as u64 / 2);
|
||||||
|
@ -14,9 +14,9 @@
|
|||||||
// You should have received a copy of the GNU General Public License
|
// You should have received a copy of the GNU General Public License
|
||||||
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
use std::net::{SocketAddr};
|
use std::net::SocketAddr;
|
||||||
use std::collections::{HashMap};
|
use std::collections::{HashMap, HashSet};
|
||||||
use std::str::{FromStr};
|
use std::str::FromStr;
|
||||||
use std::sync::*;
|
use std::sync::*;
|
||||||
use std::sync::atomic::{AtomicUsize, AtomicBool, Ordering as AtomicOrdering};
|
use std::sync::atomic::{AtomicUsize, AtomicBool, Ordering as AtomicOrdering};
|
||||||
use std::ops::*;
|
use std::ops::*;
|
||||||
@ -35,7 +35,7 @@ use rlp::*;
|
|||||||
use network::session::{Session, SessionData};
|
use network::session::{Session, SessionData};
|
||||||
use error::*;
|
use error::*;
|
||||||
use io::*;
|
use io::*;
|
||||||
use network::{NetworkProtocolHandler, PROTOCOL_VERSION};
|
use network::{NetworkProtocolHandler, NonReservedPeerMode, PROTOCOL_VERSION};
|
||||||
use network::node_table::*;
|
use network::node_table::*;
|
||||||
use network::stats::NetworkStats;
|
use network::stats::NetworkStats;
|
||||||
use network::error::{NetworkError, DisconnectReason};
|
use network::error::{NetworkError, DisconnectReason};
|
||||||
@ -65,8 +65,6 @@ pub struct NetworkConfiguration {
|
|||||||
pub nat_enabled: bool,
|
pub nat_enabled: bool,
|
||||||
/// Enable discovery
|
/// Enable discovery
|
||||||
pub discovery_enabled: bool,
|
pub discovery_enabled: bool,
|
||||||
/// Pin to reserved nodes only
|
|
||||||
pub reserved_only: bool,
|
|
||||||
/// List of initial node addresses
|
/// List of initial node addresses
|
||||||
pub boot_nodes: Vec<String>,
|
pub boot_nodes: Vec<String>,
|
||||||
/// Use provided node key instead of default
|
/// Use provided node key instead of default
|
||||||
@ -75,6 +73,8 @@ pub struct NetworkConfiguration {
|
|||||||
pub ideal_peers: u32,
|
pub ideal_peers: u32,
|
||||||
/// List of reserved node addresses.
|
/// List of reserved node addresses.
|
||||||
pub reserved_nodes: Vec<String>,
|
pub reserved_nodes: Vec<String>,
|
||||||
|
/// The non-reserved peer mode.
|
||||||
|
pub non_reserved_mode: NonReservedPeerMode,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Default for NetworkConfiguration {
|
impl Default for NetworkConfiguration {
|
||||||
@ -93,11 +93,11 @@ impl NetworkConfiguration {
|
|||||||
udp_port: None,
|
udp_port: None,
|
||||||
nat_enabled: true,
|
nat_enabled: true,
|
||||||
discovery_enabled: true,
|
discovery_enabled: true,
|
||||||
reserved_only: false,
|
|
||||||
boot_nodes: Vec::new(),
|
boot_nodes: Vec::new(),
|
||||||
use_secret: None,
|
use_secret: None,
|
||||||
ideal_peers: 25,
|
ideal_peers: 25,
|
||||||
reserved_nodes: Vec::new(),
|
reserved_nodes: Vec::new(),
|
||||||
|
non_reserved_mode: NonReservedPeerMode::Accept,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -191,13 +191,15 @@ pub struct NetworkContext<'s, Message> where Message: Send + Sync + Clone + 'sta
|
|||||||
sessions: Arc<RwLock<Slab<SharedSession>>>,
|
sessions: Arc<RwLock<Slab<SharedSession>>>,
|
||||||
session: Option<SharedSession>,
|
session: Option<SharedSession>,
|
||||||
session_id: Option<StreamToken>,
|
session_id: Option<StreamToken>,
|
||||||
|
reserved_peers: &'s HashSet<NodeId>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<'s, Message> NetworkContext<'s, Message> where Message: Send + Sync + Clone + 'static, {
|
impl<'s, Message> NetworkContext<'s, Message> where Message: Send + Sync + Clone + 'static, {
|
||||||
/// Create a new network IO access point. Takes references to all the data that can be updated within the IO handler.
|
/// Create a new network IO access point. Takes references to all the data that can be updated within the IO handler.
|
||||||
fn new(io: &'s IoContext<NetworkIoMessage<Message>>,
|
fn new(io: &'s IoContext<NetworkIoMessage<Message>>,
|
||||||
protocol: ProtocolId,
|
protocol: ProtocolId,
|
||||||
session: Option<SharedSession>, sessions: Arc<RwLock<Slab<SharedSession>>>) -> NetworkContext<'s, Message> {
|
session: Option<SharedSession>, sessions: Arc<RwLock<Slab<SharedSession>>>,
|
||||||
|
reserved_peers: &'s HashSet<NodeId>) -> NetworkContext<'s, Message> {
|
||||||
let id = session.as_ref().map(|s| s.lock().unwrap().token());
|
let id = session.as_ref().map(|s| s.lock().unwrap().token());
|
||||||
NetworkContext {
|
NetworkContext {
|
||||||
io: io,
|
io: io,
|
||||||
@ -205,6 +207,7 @@ impl<'s, Message> NetworkContext<'s, Message> where Message: Send + Sync + Clone
|
|||||||
session_id: id,
|
session_id: id,
|
||||||
session: session,
|
session: session,
|
||||||
sessions: sessions,
|
sessions: sessions,
|
||||||
|
reserved_peers: reserved_peers,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -237,7 +240,7 @@ impl<'s, Message> NetworkContext<'s, Message> where Message: Send + Sync + Clone
|
|||||||
self.io.message(NetworkIoMessage::User(msg));
|
self.io.message(NetworkIoMessage::User(msg));
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Send an IO message
|
/// Get an IoChannel.
|
||||||
pub fn io_channel(&self) -> IoChannel<NetworkIoMessage<Message>> {
|
pub fn io_channel(&self) -> IoChannel<NetworkIoMessage<Message>> {
|
||||||
self.io.channel()
|
self.io.channel()
|
||||||
}
|
}
|
||||||
@ -335,7 +338,7 @@ pub struct Host<Message> where Message: Send + Sync + Clone {
|
|||||||
timers: RwLock<HashMap<TimerToken, ProtocolTimer>>,
|
timers: RwLock<HashMap<TimerToken, ProtocolTimer>>,
|
||||||
timer_counter: RwLock<usize>,
|
timer_counter: RwLock<usize>,
|
||||||
stats: Arc<NetworkStats>,
|
stats: Arc<NetworkStats>,
|
||||||
pinned_nodes: Vec<NodeId>,
|
reserved_nodes: RwLock<HashSet<NodeId>>,
|
||||||
num_sessions: AtomicUsize,
|
num_sessions: AtomicUsize,
|
||||||
stopping: AtomicBool,
|
stopping: AtomicBool,
|
||||||
}
|
}
|
||||||
@ -390,28 +393,28 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
timers: RwLock::new(HashMap::new()),
|
timers: RwLock::new(HashMap::new()),
|
||||||
timer_counter: RwLock::new(USER_TIMER),
|
timer_counter: RwLock::new(USER_TIMER),
|
||||||
stats: stats,
|
stats: stats,
|
||||||
pinned_nodes: Vec::new(),
|
reserved_nodes: RwLock::new(HashSet::new()),
|
||||||
num_sessions: AtomicUsize::new(0),
|
num_sessions: AtomicUsize::new(0),
|
||||||
stopping: AtomicBool::new(false),
|
stopping: AtomicBool::new(false),
|
||||||
};
|
};
|
||||||
|
|
||||||
for n in boot_nodes {
|
for n in boot_nodes {
|
||||||
// don't pin boot nodes.
|
host.add_node(&n);
|
||||||
host.add_node(&n, false);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for n in reserved_nodes {
|
for n in reserved_nodes {
|
||||||
host.add_node(&n, true);
|
if let Err(e) = host.add_reserved_node(&n) {
|
||||||
|
debug!(target: "network", "Error parsing node id: {}: {:?}", n, e);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
Ok(host)
|
Ok(host)
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn add_node(&mut self, id: &str, pin: bool) {
|
pub fn add_node(&mut self, id: &str) {
|
||||||
match Node::from_str(id) {
|
match Node::from_str(id) {
|
||||||
Err(e) => { debug!(target: "network", "Could not add node {}: {:?}", id, e); },
|
Err(e) => { debug!(target: "network", "Could not add node {}: {:?}", id, e); },
|
||||||
Ok(n) => {
|
Ok(n) => {
|
||||||
let entry = NodeEntry { endpoint: n.endpoint.clone(), id: n.id.clone() };
|
let entry = NodeEntry { endpoint: n.endpoint.clone(), id: n.id.clone() };
|
||||||
if pin { self.pinned_nodes.push(n.id.clone()) }
|
|
||||||
|
|
||||||
self.nodes.write().unwrap().add_node(n);
|
self.nodes.write().unwrap().add_node(n);
|
||||||
if let Some(ref mut discovery) = *self.discovery.lock().unwrap() {
|
if let Some(ref mut discovery) = *self.discovery.lock().unwrap() {
|
||||||
@ -421,6 +424,56 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn add_reserved_node(&self, id: &str) -> Result<(), UtilError> {
|
||||||
|
let n = try!(Node::from_str(id));
|
||||||
|
|
||||||
|
let entry = NodeEntry { endpoint: n.endpoint.clone(), id: n.id.clone() };
|
||||||
|
self.reserved_nodes.write().unwrap().insert(n.id.clone());
|
||||||
|
|
||||||
|
if let Some(ref mut discovery) = *self.discovery.lock().unwrap() {
|
||||||
|
discovery.add_node(entry);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn set_non_reserved_mode(&self, mode: NonReservedPeerMode, io: &IoContext<NetworkIoMessage<Message>>) {
|
||||||
|
let mut info = self.info.write().unwrap();
|
||||||
|
|
||||||
|
if info.config.non_reserved_mode != mode {
|
||||||
|
info.config.non_reserved_mode = mode.clone();
|
||||||
|
drop(info);
|
||||||
|
if let NonReservedPeerMode::Deny = mode {
|
||||||
|
// disconnect all non-reserved peers here.
|
||||||
|
let reserved: HashSet<NodeId> = self.reserved_nodes.read().unwrap().clone();
|
||||||
|
let mut to_kill = Vec::new();
|
||||||
|
for e in self.sessions.write().unwrap().iter_mut() {
|
||||||
|
let mut s = e.lock().unwrap();
|
||||||
|
{
|
||||||
|
let id = s.id();
|
||||||
|
if id.is_some() && reserved.contains(id.unwrap()) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
s.disconnect(io, DisconnectReason::ClientQuit);
|
||||||
|
to_kill.push(s.token());
|
||||||
|
}
|
||||||
|
for p in to_kill {
|
||||||
|
trace!(target: "network", "Disconnecting on reserved-only mode: {}", p);
|
||||||
|
self.kill_connection(p, io, false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn remove_reserved_node(&self, id: &str) -> Result<(), UtilError> {
|
||||||
|
let n = try!(Node::from_str(id));
|
||||||
|
self.reserved_nodes.write().unwrap().remove(&n.id);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
pub fn client_version() -> String {
|
pub fn client_version() -> String {
|
||||||
version()
|
version()
|
||||||
}
|
}
|
||||||
@ -483,7 +536,7 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
// Initialize discovery.
|
// Initialize discovery.
|
||||||
let discovery = {
|
let discovery = {
|
||||||
let info = self.info.read().unwrap();
|
let info = self.info.read().unwrap();
|
||||||
if info.config.discovery_enabled && !info.config.reserved_only {
|
if info.config.discovery_enabled && info.config.non_reserved_mode == NonReservedPeerMode::Accept {
|
||||||
Some(Discovery::new(&info.keys, public_endpoint.address.clone(), public_endpoint, DISCOVERY))
|
Some(Discovery::new(&info.keys, public_endpoint.address.clone(), public_endpoint, DISCOVERY))
|
||||||
} else { None }
|
} else { None }
|
||||||
};
|
};
|
||||||
@ -540,17 +593,26 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
}
|
}
|
||||||
|
|
||||||
fn connect_peers(&self, io: &IoContext<NetworkIoMessage<Message>>) {
|
fn connect_peers(&self, io: &IoContext<NetworkIoMessage<Message>>) {
|
||||||
if self.info.read().unwrap().capabilities.is_empty() {
|
let (ideal_peers, mut pin) = {
|
||||||
return;
|
let info = self.info.read().unwrap();
|
||||||
}
|
if info.capabilities.is_empty() {
|
||||||
let ideal_peers = { self.info.read().unwrap().config.ideal_peers };
|
|
||||||
let pin = { self.info.read().unwrap().config.reserved_only };
|
|
||||||
let session_count = self.session_count();
|
|
||||||
if session_count >= ideal_peers as usize + self.pinned_nodes.len() {
|
|
||||||
// check if all pinned nodes are connected.
|
|
||||||
if self.pinned_nodes.iter().all(|n| self.have_session(n) && self.connecting_to(n)) {
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
let config = &info.config;
|
||||||
|
|
||||||
|
(config.ideal_peers, config.non_reserved_mode == NonReservedPeerMode::Deny)
|
||||||
|
};
|
||||||
|
|
||||||
|
let session_count = self.session_count();
|
||||||
|
let reserved_nodes = self.reserved_nodes.read().unwrap();
|
||||||
|
if session_count >= ideal_peers as usize + reserved_nodes.len() {
|
||||||
|
// check if all pinned nodes are connected.
|
||||||
|
if reserved_nodes.iter().all(|n| self.have_session(n) && self.connecting_to(n)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// if not, only attempt connect to reserved peers
|
||||||
|
pin = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
let handshake_count = self.handshake_count();
|
let handshake_count = self.handshake_count();
|
||||||
@ -562,7 +624,7 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
|
|
||||||
// iterate over all nodes, reserved ones coming first.
|
// iterate over all nodes, reserved ones coming first.
|
||||||
// if we are pinned to only reserved nodes, ignore all others.
|
// if we are pinned to only reserved nodes, ignore all others.
|
||||||
let nodes = self.pinned_nodes.iter().cloned().chain(if !pin {
|
let nodes = reserved_nodes.iter().cloned().chain(if !pin {
|
||||||
self.nodes.read().unwrap().nodes()
|
self.nodes.read().unwrap().nodes()
|
||||||
} else {
|
} else {
|
||||||
Vec::new()
|
Vec::new()
|
||||||
@ -696,11 +758,20 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
self.num_sessions.fetch_add(1, AtomicOrdering::SeqCst);
|
self.num_sessions.fetch_add(1, AtomicOrdering::SeqCst);
|
||||||
if !s.info.originated {
|
if !s.info.originated {
|
||||||
let session_count = self.session_count();
|
let session_count = self.session_count();
|
||||||
let ideal_peers = { self.info.read().unwrap().config.ideal_peers };
|
let reserved_nodes = self.reserved_nodes.read().unwrap();
|
||||||
if session_count >= ideal_peers as usize {
|
let (ideal_peers, reserved_only) = {
|
||||||
s.disconnect(io, DisconnectReason::TooManyPeers);
|
let info = self.info.read().unwrap();
|
||||||
return;
|
(info.config.ideal_peers, info.config.non_reserved_mode == NonReservedPeerMode::Deny)
|
||||||
|
};
|
||||||
|
|
||||||
|
if session_count >= ideal_peers as usize || reserved_only {
|
||||||
|
// only proceed if the connecting peer is reserved.
|
||||||
|
if !reserved_nodes.contains(s.id().unwrap()) {
|
||||||
|
s.disconnect(io, DisconnectReason::TooManyPeers);
|
||||||
|
return;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add it no node table
|
// Add it no node table
|
||||||
if let Ok(address) = s.remote_addr() {
|
if let Ok(address) = s.remote_addr() {
|
||||||
let entry = NodeEntry { id: s.id().unwrap().clone(), endpoint: NodeEndpoint { address: address, udp_port: address.port() } };
|
let entry = NodeEntry { id: s.id().unwrap().clone(), endpoint: NodeEndpoint { address: address, udp_port: address.port() } };
|
||||||
@ -735,14 +806,17 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
if kill {
|
if kill {
|
||||||
self.kill_connection(token, io, true);
|
self.kill_connection(token, io, true);
|
||||||
}
|
}
|
||||||
|
let handlers = self.handlers.read().unwrap();
|
||||||
for p in ready_data {
|
for p in ready_data {
|
||||||
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
|
let h = handlers.get(p).unwrap().clone();
|
||||||
self.stats.inc_sessions();
|
self.stats.inc_sessions();
|
||||||
h.connected(&NetworkContext::new(io, p, session.clone(), self.sessions.clone()), &token);
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
|
h.connected(&NetworkContext::new(io, p, session.clone(), self.sessions.clone(), &reserved), &token);
|
||||||
}
|
}
|
||||||
for (p, packet_id, data) in packet_data {
|
for (p, packet_id, data) in packet_data {
|
||||||
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
|
let h = handlers.get(p).unwrap().clone();
|
||||||
h.read(&NetworkContext::new(io, p, session.clone(), self.sessions.clone()), &token, packet_id, &data[1..]);
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
|
h.read(&NetworkContext::new(io, p, session.clone(), self.sessions.clone(), &reserved), &token, packet_id, &data[1..]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -783,7 +857,8 @@ impl<Message> Host<Message> where Message: Send + Sync + Clone {
|
|||||||
}
|
}
|
||||||
for p in to_disconnect {
|
for p in to_disconnect {
|
||||||
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
|
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
|
||||||
h.disconnected(&NetworkContext::new(io, p, expired_session.clone(), self.sessions.clone()), &token);
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
|
h.disconnected(&NetworkContext::new(io, p, expired_session.clone(), self.sessions.clone(), &reserved), &token);
|
||||||
}
|
}
|
||||||
if deregister {
|
if deregister {
|
||||||
io.deregister_stream(token).unwrap_or_else(|e| debug!("Error deregistering stream: {:?}", e));
|
io.deregister_stream(token).unwrap_or_else(|e| debug!("Error deregistering stream: {:?}", e));
|
||||||
@ -886,7 +961,10 @@ impl<Message> IoHandler<NetworkIoMessage<Message>> for Host<Message> where Messa
|
|||||||
_ => match self.timers.read().unwrap().get(&token).cloned() {
|
_ => match self.timers.read().unwrap().get(&token).cloned() {
|
||||||
Some(timer) => match self.handlers.read().unwrap().get(timer.protocol).cloned() {
|
Some(timer) => match self.handlers.read().unwrap().get(timer.protocol).cloned() {
|
||||||
None => { warn!(target: "network", "No handler found for protocol: {:?}", timer.protocol) },
|
None => { warn!(target: "network", "No handler found for protocol: {:?}", timer.protocol) },
|
||||||
Some(h) => { h.timeout(&NetworkContext::new(io, timer.protocol, None, self.sessions.clone()), timer.token); }
|
Some(h) => {
|
||||||
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
|
h.timeout(&NetworkContext::new(io, timer.protocol, None, self.sessions.clone(), &reserved), timer.token);
|
||||||
|
}
|
||||||
},
|
},
|
||||||
None => { warn!("Unknown timer token: {}", token); } // timer is not registerd through us
|
None => { warn!("Unknown timer token: {}", token); } // timer is not registerd through us
|
||||||
}
|
}
|
||||||
@ -904,7 +982,8 @@ impl<Message> IoHandler<NetworkIoMessage<Message>> for Host<Message> where Messa
|
|||||||
ref versions
|
ref versions
|
||||||
} => {
|
} => {
|
||||||
let h = handler.clone();
|
let h = handler.clone();
|
||||||
h.initialize(&NetworkContext::new(io, protocol, None, self.sessions.clone()));
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
|
h.initialize(&NetworkContext::new(io, protocol, None, self.sessions.clone(), &reserved));
|
||||||
self.handlers.write().unwrap().insert(protocol, h);
|
self.handlers.write().unwrap().insert(protocol, h);
|
||||||
let mut info = self.info.write().unwrap();
|
let mut info = self.info.write().unwrap();
|
||||||
for v in versions {
|
for v in versions {
|
||||||
@ -946,8 +1025,9 @@ impl<Message> IoHandler<NetworkIoMessage<Message>> for Host<Message> where Messa
|
|||||||
self.kill_connection(*peer, io, false);
|
self.kill_connection(*peer, io, false);
|
||||||
},
|
},
|
||||||
NetworkIoMessage::User(ref message) => {
|
NetworkIoMessage::User(ref message) => {
|
||||||
|
let reserved = self.reserved_nodes.read().unwrap();
|
||||||
for (p, h) in self.handlers.read().unwrap().iter() {
|
for (p, h) in self.handlers.read().unwrap().iter() {
|
||||||
h.message(&NetworkContext::new(io, p, None, self.sessions.clone()), &message);
|
h.message(&NetworkContext::new(io, p, None, self.sessions.clone(), &reserved), &message);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -14,8 +14,8 @@
|
|||||||
// You should have received a copy of the GNU General Public License
|
// You should have received a copy of the GNU General Public License
|
||||||
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
//! Network and general IO module.
|
//! Network and general IO module.
|
||||||
//!
|
//!
|
||||||
//! Example usage for craeting a network service and adding an IO handler:
|
//! Example usage for craeting a network service and adding an IO handler:
|
||||||
//!
|
//!
|
||||||
//! ```rust
|
//! ```rust
|
||||||
@ -112,3 +112,22 @@ pub trait NetworkProtocolHandler<Message>: Sync + Send where Message: Send + Syn
|
|||||||
fn message(&self, _io: &NetworkContext<Message>, _message: &Message) {}
|
fn message(&self, _io: &NetworkContext<Message>, _message: &Message) {}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Non-reserved peer modes.
|
||||||
|
#[derive(Clone, Debug, PartialEq, Eq)]
|
||||||
|
pub enum NonReservedPeerMode {
|
||||||
|
/// Accept them. This is the default.
|
||||||
|
Accept,
|
||||||
|
/// Deny them.
|
||||||
|
Deny,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl NonReservedPeerMode {
|
||||||
|
/// Attempt to parse the peer mode from a string.
|
||||||
|
pub fn parse(s: &str) -> Option<Self> {
|
||||||
|
match s {
|
||||||
|
"accept" => Some(NonReservedPeerMode::Accept),
|
||||||
|
"deny" => Some(NonReservedPeerMode::Deny),
|
||||||
|
_ => None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -18,9 +18,9 @@ use std::sync::*;
|
|||||||
use error::*;
|
use error::*;
|
||||||
use panics::*;
|
use panics::*;
|
||||||
use network::{NetworkProtocolHandler, NetworkConfiguration};
|
use network::{NetworkProtocolHandler, NetworkConfiguration};
|
||||||
use network::error::{NetworkError};
|
use network::error::NetworkError;
|
||||||
use network::host::{Host, NetworkIoMessage, ProtocolId};
|
use network::host::{Host, NetworkIoMessage, ProtocolId};
|
||||||
use network::stats::{NetworkStats};
|
use network::stats::NetworkStats;
|
||||||
use io::*;
|
use io::*;
|
||||||
|
|
||||||
/// IO Service with networking
|
/// IO Service with networking
|
||||||
@ -111,6 +111,35 @@ impl<Message> NetworkService<Message> where Message: Send + Sync + Clone + 'stat
|
|||||||
*host = None;
|
*host = None;
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Try to add a reserved peer.
|
||||||
|
pub fn add_reserved_peer(&self, peer: &str) -> Result<(), UtilError> {
|
||||||
|
let host = self.host.read().unwrap();
|
||||||
|
if let Some(ref host) = *host {
|
||||||
|
host.add_reserved_node(peer)
|
||||||
|
} else {
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Try to remove a reserved peer.
|
||||||
|
pub fn remove_reserved_peer(&self, peer: &str) -> Result<(), UtilError> {
|
||||||
|
let host = self.host.read().unwrap();
|
||||||
|
if let Some(ref host) = *host {
|
||||||
|
host.remove_reserved_node(peer)
|
||||||
|
} else {
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set the non-reserved peer mode.
|
||||||
|
pub fn set_non_reserved_mode(&self, mode: ::network::NonReservedPeerMode) {
|
||||||
|
let host = self.host.read().unwrap();
|
||||||
|
if let Some(ref host) = *host {
|
||||||
|
let io_ctxt = IoContext::new(self.io_service.channel(), 0);
|
||||||
|
host.set_non_reserved_mode(mode, &io_ctxt);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<Message> MayPanic for NetworkService<Message> where Message: Send + Sync + Clone + 'static {
|
impl<Message> MayPanic for NetworkService<Message> where Message: Send + Sync + Clone + 'static {
|
||||||
|
Loading…
Reference in New Issue
Block a user