491 lines
16 KiB
Rust
491 lines
16 KiB
Rust
// Copyright 2015, 2016 Ethcore (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use std::sync::Arc;
|
|
use std::collections::HashMap;
|
|
use std::io;
|
|
use util::Bytes;
|
|
use network::{NetworkProtocolHandler, NetworkService, NetworkContext, PeerId, ProtocolId,
|
|
NetworkConfiguration as BasicNetworkConfiguration, NonReservedPeerMode, NetworkError,
|
|
AllowIP as NetworkAllowIP};
|
|
use util::{U256, H256};
|
|
use io::{TimerToken};
|
|
use ethcore::client::{BlockChainClient, ChainNotify};
|
|
use ethcore::snapshot::SnapshotService;
|
|
use ethcore::header::BlockNumber;
|
|
use sync_io::NetSyncIo;
|
|
use chain::{ChainSync, SyncStatus};
|
|
use infinity::{InfinitySync};
|
|
use std::net::{SocketAddr, AddrParseError};
|
|
use ipc::{BinaryConvertable, BinaryConvertError, IpcConfig};
|
|
use std::str::FromStr;
|
|
use parking_lot::RwLock;
|
|
use chain::{ETH_PACKET_COUNT, SNAPSHOT_SYNC_PACKET_COUNT};
|
|
|
|
pub const WARP_SYNC_PROTOCOL_ID: ProtocolId = *b"par";
|
|
|
|
/// Ethereum sync protocol
|
|
pub const ETH_PROTOCOL: [u8; 3] = *b"eth";
|
|
/// Infinity protocol
|
|
pub const INF_PROTOCOL: [u8; 3] = *b"inf";
|
|
|
|
/// Sync configuration
|
|
#[derive(Debug, Clone, Copy)]
|
|
pub struct SyncConfig {
|
|
/// Max blocks to download ahead
|
|
pub max_download_ahead_blocks: usize,
|
|
/// Network ID
|
|
pub network_id: usize,
|
|
/// Main "eth" subprotocol name.
|
|
pub subprotocol_name: [u8; 3],
|
|
/// Fork block to check
|
|
pub fork_block: Option<(BlockNumber, H256)>,
|
|
/// Enable snapshot sync
|
|
pub warp_sync: bool,
|
|
}
|
|
|
|
impl Default for SyncConfig {
|
|
fn default() -> SyncConfig {
|
|
SyncConfig {
|
|
max_download_ahead_blocks: 20000,
|
|
network_id: 1,
|
|
subprotocol_name: ETH_PROTOCOL,
|
|
fork_block: None,
|
|
warp_sync: false,
|
|
}
|
|
}
|
|
}
|
|
|
|
binary_fixed_size!(SyncConfig);
|
|
binary_fixed_size!(SyncStatus);
|
|
|
|
/// Current sync status
|
|
pub trait SyncProvider: Send + Sync {
|
|
/// Get sync status
|
|
fn status(&self) -> SyncStatus;
|
|
|
|
/// Get peers information
|
|
fn peers(&self) -> Vec<PeerInfo>;
|
|
|
|
/// Get the enode if available.
|
|
fn enode(&self) -> Option<String>;
|
|
}
|
|
|
|
/// Peer connection information
|
|
#[derive(Debug, Binary)]
|
|
pub struct PeerInfo {
|
|
/// Public node id
|
|
pub id: Option<String>,
|
|
/// Node client ID
|
|
pub client_version: String,
|
|
/// Capabilities
|
|
pub capabilities: Vec<String>,
|
|
/// Remote endpoint address
|
|
pub remote_address: String,
|
|
/// Local endpoint address
|
|
pub local_address: String,
|
|
/// Ethereum protocol version
|
|
pub eth_version: u32,
|
|
/// SHA3 of peer best block hash
|
|
pub eth_head: H256,
|
|
/// Peer total difficulty if known
|
|
pub eth_difficulty: Option<U256>,
|
|
}
|
|
|
|
/// Ethereum network protocol handler
|
|
pub struct EthSync {
|
|
/// Network service
|
|
network: NetworkService,
|
|
/// Ethereum Protocol handler
|
|
eth_handler: Arc<SyncProtocolHandler>,
|
|
/// Infinity Protocol handler
|
|
inf_handler: Arc<InfProtocolHandler>,
|
|
/// The main subprotocol name
|
|
subprotocol_name: [u8; 3],
|
|
/// Configuration
|
|
config: NetworkConfiguration,
|
|
}
|
|
|
|
impl EthSync {
|
|
/// Creates and register protocol with the network service
|
|
pub fn new(config: SyncConfig, chain: Arc<BlockChainClient>, snapshot_service: Arc<SnapshotService>, network_config: NetworkConfiguration) -> Result<Arc<EthSync>, NetworkError> {
|
|
let inf_sync = InfinitySync::new(&config, chain.clone());
|
|
let chain_sync = ChainSync::new(config, &*chain);
|
|
let service = try!(NetworkService::new(try!(network_config.clone().into_basic())));
|
|
let sync = Arc::new(EthSync{
|
|
network: service,
|
|
eth_handler: Arc::new(SyncProtocolHandler {
|
|
sync: RwLock::new(chain_sync),
|
|
chain: chain.clone(),
|
|
snapshot_service: snapshot_service.clone(),
|
|
overlay: RwLock::new(HashMap::new()),
|
|
}),
|
|
inf_handler: Arc::new(InfProtocolHandler {
|
|
sync: RwLock::new(inf_sync),
|
|
chain: chain,
|
|
snapshot_service: snapshot_service,
|
|
overlay: RwLock::new(HashMap::new()),
|
|
}),
|
|
subprotocol_name: config.subprotocol_name,
|
|
config: network_config,
|
|
});
|
|
|
|
Ok(sync)
|
|
}
|
|
}
|
|
|
|
#[ipc(client_ident="SyncClient")]
|
|
impl SyncProvider for EthSync {
|
|
/// Get sync status
|
|
fn status(&self) -> SyncStatus {
|
|
self.eth_handler.sync.write().status()
|
|
}
|
|
|
|
/// Get sync peers
|
|
fn peers(&self) -> Vec<PeerInfo> {
|
|
self.network.with_context_eval(self.subprotocol_name, |context| {
|
|
let sync_io = NetSyncIo::new(context, &*self.eth_handler.chain, &*self.eth_handler.snapshot_service, &self.eth_handler.overlay);
|
|
self.eth_handler.sync.write().peers(&sync_io)
|
|
}).unwrap_or(Vec::new())
|
|
}
|
|
|
|
fn enode(&self) -> Option<String> {
|
|
self.network.external_url()
|
|
}
|
|
}
|
|
|
|
struct SyncProtocolHandler {
|
|
/// Shared blockchain client.
|
|
chain: Arc<BlockChainClient>,
|
|
/// Shared snapshot service.
|
|
snapshot_service: Arc<SnapshotService>,
|
|
/// Sync strategy
|
|
sync: RwLock<ChainSync>,
|
|
/// Chain overlay used to cache data such as fork block.
|
|
overlay: RwLock<HashMap<BlockNumber, Bytes>>,
|
|
}
|
|
|
|
impl NetworkProtocolHandler for SyncProtocolHandler {
|
|
fn initialize(&self, io: &NetworkContext) {
|
|
if io.subprotocol_name() != WARP_SYNC_PROTOCOL_ID {
|
|
io.register_timer(0, 1000).expect("Error registering sync timer");
|
|
}
|
|
}
|
|
|
|
fn read(&self, io: &NetworkContext, peer: &PeerId, packet_id: u8, data: &[u8]) {
|
|
ChainSync::dispatch_packet(&self.sync, &mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer, packet_id, data);
|
|
}
|
|
|
|
fn connected(&self, io: &NetworkContext, peer: &PeerId) {
|
|
// If warp protocol is supported only allow warp handshake
|
|
let warp_protocol = io.protocol_version(WARP_SYNC_PROTOCOL_ID, *peer).unwrap_or(0) != 0;
|
|
let warp_context = io.subprotocol_name() == WARP_SYNC_PROTOCOL_ID;
|
|
if warp_protocol == warp_context {
|
|
self.sync.write().on_peer_connected(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer);
|
|
}
|
|
}
|
|
|
|
fn disconnected(&self, io: &NetworkContext, peer: &PeerId) {
|
|
if io.subprotocol_name() != WARP_SYNC_PROTOCOL_ID {
|
|
self.sync.write().on_peer_aborting(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer);
|
|
}
|
|
}
|
|
|
|
fn timeout(&self, io: &NetworkContext, _timer: TimerToken) {
|
|
self.sync.write().maintain_peers(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay));
|
|
self.sync.write().maintain_sync(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay));
|
|
self.sync.write().propagate_new_transactions(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay));
|
|
}
|
|
}
|
|
|
|
struct InfProtocolHandler {
|
|
/// Shared blockchain client.
|
|
chain: Arc<BlockChainClient>,
|
|
/// Shared snapshot service.
|
|
snapshot_service: Arc<SnapshotService>,
|
|
/// Sync strategy
|
|
sync: RwLock<InfinitySync>,
|
|
/// Chain overlay used to cache data such as fork block.
|
|
overlay: RwLock<HashMap<BlockNumber, Bytes>>,
|
|
}
|
|
|
|
impl NetworkProtocolHandler for InfProtocolHandler {
|
|
fn initialize(&self, _io: &NetworkContext) {
|
|
}
|
|
|
|
fn read(&self, io: &NetworkContext, peer: &PeerId, packet_id: u8, data: &[u8]) {
|
|
InfinitySync::dispatch_packet(&self.sync, &mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer, packet_id, data);
|
|
}
|
|
|
|
fn connected(&self, io: &NetworkContext, peer: &PeerId) {
|
|
self.sync.write().on_peer_connected(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer);
|
|
}
|
|
|
|
fn disconnected(&self, io: &NetworkContext, peer: &PeerId) {
|
|
self.sync.write().on_peer_aborting(&mut NetSyncIo::new(io, &*self.chain, &*self.snapshot_service, &self.overlay), *peer);
|
|
}
|
|
|
|
fn timeout(&self, _io: &NetworkContext, _timer: TimerToken) {
|
|
}
|
|
}
|
|
|
|
impl ChainNotify for EthSync {
|
|
fn new_blocks(&self,
|
|
imported: Vec<H256>,
|
|
invalid: Vec<H256>,
|
|
enacted: Vec<H256>,
|
|
retracted: Vec<H256>,
|
|
sealed: Vec<H256>,
|
|
_duration: u64)
|
|
{
|
|
self.network.with_context(self.subprotocol_name, |context| {
|
|
let mut sync_io = NetSyncIo::new(context, &*self.eth_handler.chain, &*self.eth_handler.snapshot_service, &self.eth_handler.overlay);
|
|
self.eth_handler.sync.write().chain_new_blocks(
|
|
&mut sync_io,
|
|
&imported,
|
|
&invalid,
|
|
&enacted,
|
|
&retracted,
|
|
&sealed);
|
|
});
|
|
}
|
|
|
|
fn start(&self) {
|
|
match self.network.start() {
|
|
Err(NetworkError::StdIo(ref e)) if e.kind() == io::ErrorKind::AddrInUse => warn!("Network port {:?} is already in use, make sure that another instance of an Ethereum client is not running or change the port using the --port option.", self.network.config().listen_address.expect("Listen address is not set.")),
|
|
Err(err) => warn!("Error starting network: {}", err),
|
|
_ => {},
|
|
}
|
|
self.network.register_protocol(self.eth_handler.clone(), self.subprotocol_name, ETH_PACKET_COUNT, &[62u8, 63u8])
|
|
.unwrap_or_else(|e| warn!("Error registering ethereum protocol: {:?}", e));
|
|
// register the warp sync subprotocol
|
|
self.network.register_protocol(self.eth_handler.clone(), WARP_SYNC_PROTOCOL_ID, SNAPSHOT_SYNC_PACKET_COUNT, &[1u8])
|
|
.unwrap_or_else(|e| warn!("Error registering snapshot sync protocol: {:?}", e));
|
|
// register the inf sync subprotocol
|
|
self.network.register_protocol(self.inf_handler.clone(), INF_PROTOCOL, ETH_PACKET_COUNT, &[1u8])
|
|
.unwrap_or_else(|e| warn!("Error registering infinity protocol: {:?}", e));
|
|
}
|
|
|
|
fn stop(&self) {
|
|
self.eth_handler.snapshot_service.abort_restore();
|
|
self.network.stop().unwrap_or_else(|e| warn!("Error stopping network: {:?}", e));
|
|
}
|
|
|
|
fn broadcast(&self, message: Vec<u8>) {
|
|
self.network.with_context(ETH_PROTOCOL, |context| {
|
|
let mut sync_io = NetSyncIo::new(context, &*self.eth_handler.chain, &*self.eth_handler.snapshot_service, &self.eth_handler.overlay);
|
|
self.inf_handler.sync.write().propagate_packet(&mut sync_io, message.clone());
|
|
});
|
|
}
|
|
}
|
|
|
|
impl IpcConfig for ManageNetwork { }
|
|
impl IpcConfig for SyncProvider { }
|
|
|
|
/// Trait for managing network
|
|
pub trait ManageNetwork : Send + Sync {
|
|
/// Set to allow unreserved peers to connect
|
|
fn accept_unreserved_peers(&self);
|
|
/// Set to deny unreserved peers to connect
|
|
fn deny_unreserved_peers(&self);
|
|
/// Remove reservation for the peer
|
|
fn remove_reserved_peer(&self, peer: String) -> Result<(), String>;
|
|
/// Add reserved peer
|
|
fn add_reserved_peer(&self, peer: String) -> Result<(), String>;
|
|
/// Start network
|
|
fn start_network(&self);
|
|
/// Stop network
|
|
fn stop_network(&self);
|
|
/// Query the current configuration of the network
|
|
fn network_config(&self) -> NetworkConfiguration;
|
|
}
|
|
|
|
|
|
#[ipc(client_ident="NetworkManagerClient")]
|
|
impl ManageNetwork for EthSync {
|
|
fn accept_unreserved_peers(&self) {
|
|
self.network.set_non_reserved_mode(NonReservedPeerMode::Accept);
|
|
}
|
|
|
|
fn deny_unreserved_peers(&self) {
|
|
self.network.set_non_reserved_mode(NonReservedPeerMode::Deny);
|
|
}
|
|
|
|
fn remove_reserved_peer(&self, peer: String) -> Result<(), String> {
|
|
self.network.remove_reserved_peer(&peer).map_err(|e| format!("{:?}", e))
|
|
}
|
|
|
|
fn add_reserved_peer(&self, peer: String) -> Result<(), String> {
|
|
self.network.add_reserved_peer(&peer).map_err(|e| format!("{:?}", e))
|
|
}
|
|
|
|
fn start_network(&self) {
|
|
self.start();
|
|
}
|
|
|
|
fn stop_network(&self) {
|
|
self.network.with_context(self.subprotocol_name, |context| {
|
|
let mut sync_io = NetSyncIo::new(context, &*self.eth_handler.chain, &*self.eth_handler.snapshot_service, &self.eth_handler.overlay);
|
|
self.eth_handler.sync.write().abort(&mut sync_io);
|
|
});
|
|
self.stop();
|
|
}
|
|
|
|
fn network_config(&self) -> NetworkConfiguration {
|
|
NetworkConfiguration::from(self.network.config().clone())
|
|
}
|
|
}
|
|
|
|
/// IP fiter
|
|
#[derive(Binary, Clone, Debug, PartialEq, Eq)]
|
|
pub enum AllowIP {
|
|
/// Connect to any address
|
|
All,
|
|
/// Connect to private network only
|
|
Private,
|
|
/// Connect to public network only
|
|
Public,
|
|
}
|
|
|
|
impl AllowIP {
|
|
/// Attempt to parse the peer mode from a string.
|
|
pub fn parse(s: &str) -> Option<Self> {
|
|
match s {
|
|
"all" => Some(AllowIP::All),
|
|
"private" => Some(AllowIP::Private),
|
|
"public" => Some(AllowIP::Public),
|
|
_ => None,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Binary, Debug, Clone, PartialEq, Eq)]
|
|
/// Network service configuration
|
|
pub struct NetworkConfiguration {
|
|
/// Directory path to store general network configuration. None means nothing will be saved
|
|
pub config_path: Option<String>,
|
|
/// Directory path to store network-specific configuration. None means nothing will be saved
|
|
pub net_config_path: Option<String>,
|
|
/// IP address to listen for incoming connections. Listen to all connections by default
|
|
pub listen_address: Option<String>,
|
|
/// IP address to advertise. Detected automatically if none.
|
|
pub public_address: Option<String>,
|
|
/// Port for UDP connections, same as TCP by default
|
|
pub udp_port: Option<u16>,
|
|
/// Enable NAT configuration
|
|
pub nat_enabled: bool,
|
|
/// Enable discovery
|
|
pub discovery_enabled: bool,
|
|
/// List of initial node addresses
|
|
pub boot_nodes: Vec<String>,
|
|
/// Use provided node key instead of default
|
|
pub use_secret: Option<H256>,
|
|
/// Max number of connected peers to maintain
|
|
pub max_peers: u32,
|
|
/// Min number of connected peers to maintain
|
|
pub min_peers: u32,
|
|
/// Max pending peers.
|
|
pub max_pending_peers: u32,
|
|
/// Reserved snapshot sync peers.
|
|
pub snapshot_peers: u32,
|
|
/// List of reserved node addresses.
|
|
pub reserved_nodes: Vec<String>,
|
|
/// The non-reserved peer mode.
|
|
pub allow_non_reserved: bool,
|
|
/// IP Filtering
|
|
pub allow_ips: AllowIP,
|
|
}
|
|
|
|
impl NetworkConfiguration {
|
|
pub fn new() -> Self {
|
|
From::from(BasicNetworkConfiguration::new())
|
|
}
|
|
|
|
pub fn new_local() -> Self {
|
|
From::from(BasicNetworkConfiguration::new_local())
|
|
}
|
|
|
|
fn validate(&self) -> Result<(), AddrParseError> {
|
|
if let Some(ref addr) = self.listen_address {
|
|
try!(SocketAddr::from_str(&addr));
|
|
}
|
|
if let Some(ref addr) = self.public_address {
|
|
try!(SocketAddr::from_str(&addr));
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
pub fn into_basic(self) -> Result<BasicNetworkConfiguration, AddrParseError> {
|
|
|
|
Ok(BasicNetworkConfiguration {
|
|
config_path: self.config_path,
|
|
net_config_path: self.net_config_path,
|
|
listen_address: match self.listen_address { None => None, Some(addr) => Some(try!(SocketAddr::from_str(&addr))) },
|
|
public_address: match self.public_address { None => None, Some(addr) => Some(try!(SocketAddr::from_str(&addr))) },
|
|
udp_port: self.udp_port,
|
|
nat_enabled: self.nat_enabled,
|
|
discovery_enabled: self.discovery_enabled,
|
|
boot_nodes: self.boot_nodes,
|
|
use_secret: self.use_secret,
|
|
max_peers: self.max_peers,
|
|
min_peers: self.min_peers,
|
|
max_handshakes: self.max_pending_peers,
|
|
reserved_protocols: hash_map![WARP_SYNC_PROTOCOL_ID => self.snapshot_peers],
|
|
reserved_nodes: self.reserved_nodes,
|
|
allow_ips: match self.allow_ips {
|
|
AllowIP::All => NetworkAllowIP::All,
|
|
AllowIP::Private => NetworkAllowIP::Private,
|
|
AllowIP::Public => NetworkAllowIP::Public,
|
|
},
|
|
non_reserved_mode: if self.allow_non_reserved { NonReservedPeerMode::Accept } else { NonReservedPeerMode::Deny },
|
|
})
|
|
}
|
|
}
|
|
|
|
impl From<BasicNetworkConfiguration> for NetworkConfiguration {
|
|
fn from(other: BasicNetworkConfiguration) -> Self {
|
|
NetworkConfiguration {
|
|
config_path: other.config_path,
|
|
net_config_path: other.net_config_path,
|
|
listen_address: other.listen_address.and_then(|addr| Some(format!("{}", addr))),
|
|
public_address: other.public_address.and_then(|addr| Some(format!("{}", addr))),
|
|
udp_port: other.udp_port,
|
|
nat_enabled: other.nat_enabled,
|
|
discovery_enabled: other.discovery_enabled,
|
|
boot_nodes: other.boot_nodes,
|
|
use_secret: other.use_secret,
|
|
max_peers: other.max_peers,
|
|
min_peers: other.min_peers,
|
|
max_pending_peers: other.max_handshakes,
|
|
snapshot_peers: *other.reserved_protocols.get(&WARP_SYNC_PROTOCOL_ID).unwrap_or(&0),
|
|
reserved_nodes: other.reserved_nodes,
|
|
allow_ips: match other.allow_ips {
|
|
NetworkAllowIP::All => AllowIP::All,
|
|
NetworkAllowIP::Private => AllowIP::Private,
|
|
NetworkAllowIP::Public => AllowIP::Public,
|
|
},
|
|
allow_non_reserved: match other.non_reserved_mode { NonReservedPeerMode::Accept => true, _ => false } ,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Binary, Clone)]
|
|
pub struct ServiceConfiguration {
|
|
pub sync: SyncConfig,
|
|
pub net: NetworkConfiguration,
|
|
pub io_path: String,
|
|
}
|