mirror of https://github.com/status-im/go-waku.git
367 lines
9.2 KiB
Go
367 lines
9.2 KiB
Go
package node
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net"
|
|
"strconv"
|
|
|
|
"github.com/ethereum/go-ethereum/p2p/enode"
|
|
"github.com/ethereum/go-ethereum/p2p/enr"
|
|
"github.com/libp2p/go-libp2p/core/event"
|
|
ma "github.com/multiformats/go-multiaddr"
|
|
"github.com/waku-org/go-waku/waku/v2/protocol"
|
|
wenr "github.com/waku-org/go-waku/waku/v2/protocol/enr"
|
|
"github.com/waku-org/go-waku/waku/v2/protocol/relay"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
func (w *WakuNode) updateLocalNode(localnode *enode.LocalNode, multiaddrs []ma.Multiaddr, ipAddr *net.TCPAddr, udpPort uint, wakuFlags wenr.WakuEnrBitfield, advertiseAddr []ma.Multiaddr, shouldAutoUpdate bool, log *zap.Logger) error {
|
|
var options []wenr.ENROption
|
|
options = append(options, wenr.WithUDPPort(udpPort))
|
|
options = append(options, wenr.WithWakuBitfield(wakuFlags))
|
|
options = append(options, wenr.WithMultiaddress(multiaddrs...))
|
|
|
|
if advertiseAddr != nil {
|
|
// An advertised address disables libp2p address updates
|
|
// and discv5 predictions
|
|
ipAddr, err := selectMostExternalAddress(advertiseAddr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
options = append(options, wenr.WithIP(ipAddr))
|
|
} else if !shouldAutoUpdate {
|
|
// We received a libp2p address update. Autoupdate is disabled
|
|
// Using a static ip will disable endpoint prediction.
|
|
options = append(options, wenr.WithIP(ipAddr))
|
|
} else {
|
|
// We received a libp2p address update, but we should still
|
|
// allow discv5 to update the enr record. We set the localnode
|
|
// keys manually. It's possible that the ENR record might get
|
|
// updated automatically
|
|
ip4 := ipAddr.IP.To4()
|
|
ip6 := ipAddr.IP.To16()
|
|
if ip4 != nil && !ip4.IsUnspecified() {
|
|
localnode.Set(enr.IPv4(ip4))
|
|
localnode.Set(enr.TCP(uint16(ipAddr.Port)))
|
|
} else {
|
|
localnode.Delete(enr.IPv4{})
|
|
localnode.Delete(enr.TCP(0))
|
|
}
|
|
|
|
if ip4 == nil && ip6 != nil && !ip6.IsUnspecified() {
|
|
localnode.Set(enr.IPv6(ip6))
|
|
localnode.Set(enr.TCP6(ipAddr.Port))
|
|
} else {
|
|
localnode.Delete(enr.IPv6{})
|
|
localnode.Delete(enr.TCP6(0))
|
|
}
|
|
}
|
|
|
|
localnode.SetFallbackIP(net.IP{127, 0, 0, 1})
|
|
|
|
return wenr.Update(localnode, options...)
|
|
}
|
|
|
|
func isPrivate(addr *net.TCPAddr) bool {
|
|
return addr.IP.IsPrivate()
|
|
}
|
|
|
|
func isExternal(addr *net.TCPAddr) bool {
|
|
return !isPrivate(addr) && !addr.IP.IsLoopback() && !addr.IP.IsUnspecified()
|
|
}
|
|
|
|
func isLoopback(addr *net.TCPAddr) bool {
|
|
return addr.IP.IsLoopback()
|
|
}
|
|
|
|
func filterIP(ss []*net.TCPAddr, fn func(*net.TCPAddr) bool) (ret []*net.TCPAddr) {
|
|
for _, s := range ss {
|
|
if fn(s) {
|
|
ret = append(ret, s)
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func extractIPAddressForENR(addr ma.Multiaddr) (*net.TCPAddr, error) {
|
|
// It's a p2p-circuit address. We shouldnt use these
|
|
// for building the ENR record default keys
|
|
_, err := addr.ValueForProtocol(ma.P_CIRCUIT)
|
|
if err == nil {
|
|
return nil, errors.New("can't use IP address from a p2p-circuit address")
|
|
}
|
|
|
|
// ws and wss addresses are handled by the multiaddr key
|
|
// they shouldnt be used for building the ENR record default keys
|
|
_, err = addr.ValueForProtocol(ma.P_WS)
|
|
if err == nil {
|
|
return nil, errors.New("can't use IP address from a ws address")
|
|
}
|
|
_, err = addr.ValueForProtocol(ma.P_WSS)
|
|
if err == nil {
|
|
return nil, errors.New("can't use IP address from a wss address")
|
|
}
|
|
|
|
var ipStr string
|
|
dns4, err := addr.ValueForProtocol(ma.P_DNS4)
|
|
if err != nil {
|
|
ipStr, err = addr.ValueForProtocol(ma.P_IP4)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
} else {
|
|
netIP, err := net.ResolveIPAddr("ip4", dns4)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ipStr = netIP.String()
|
|
}
|
|
|
|
portStr, err := addr.ValueForProtocol(ma.P_TCP)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
port, err := strconv.Atoi(portStr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &net.TCPAddr{
|
|
IP: net.ParseIP(ipStr),
|
|
Port: port,
|
|
}, nil
|
|
}
|
|
|
|
func selectMostExternalAddress(addresses []ma.Multiaddr) (*net.TCPAddr, error) {
|
|
var ipAddrs []*net.TCPAddr
|
|
for _, addr := range addresses {
|
|
ipAddr, err := extractIPAddressForENR(addr)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
ipAddrs = append(ipAddrs, ipAddr)
|
|
}
|
|
|
|
externalIPs := filterIP(ipAddrs, isExternal)
|
|
if len(externalIPs) > 0 {
|
|
return externalIPs[0], nil
|
|
}
|
|
|
|
privateIPs := filterIP(ipAddrs, isPrivate)
|
|
if len(privateIPs) > 0 {
|
|
return privateIPs[0], nil
|
|
}
|
|
|
|
loopback := filterIP(ipAddrs, isLoopback)
|
|
if len(loopback) > 0 {
|
|
return loopback[0], nil
|
|
}
|
|
|
|
return nil, errors.New("could not obtain ip address")
|
|
}
|
|
|
|
func decapsulateP2P(addr ma.Multiaddr) (ma.Multiaddr, error) {
|
|
p2p, err := addr.ValueForProtocol(ma.P_P2P)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
p2pAddr, err := ma.NewMultiaddr("/p2p/" + p2p)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
addr = addr.Decapsulate(p2pAddr)
|
|
|
|
return addr, nil
|
|
}
|
|
|
|
func decapsulateCircuitRelayAddr(addr ma.Multiaddr) (ma.Multiaddr, error) {
|
|
_, err := addr.ValueForProtocol(ma.P_CIRCUIT)
|
|
if err != nil {
|
|
return nil, errors.New("not a circuit relay address")
|
|
}
|
|
|
|
// We remove the node's multiaddress from the addr
|
|
addr, _ = ma.SplitFunc(addr, func(c ma.Component) bool {
|
|
return c.Protocol().Code == ma.P_CIRCUIT
|
|
})
|
|
|
|
return addr, nil
|
|
}
|
|
|
|
func selectWSSListenAddresses(addresses []ma.Multiaddr) ([]ma.Multiaddr, error) {
|
|
var result []ma.Multiaddr
|
|
for _, addr := range addresses {
|
|
// It's a p2p-circuit address. We dont use these at this stage yet
|
|
_, err := addr.ValueForProtocol(ma.P_CIRCUIT)
|
|
if err == nil {
|
|
continue
|
|
}
|
|
|
|
// Only WSS with a domain name are allowed
|
|
_, err = addr.ValueForProtocol(ma.P_DNS4)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
_, err = addr.ValueForProtocol(ma.P_WSS)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
addr, err = decapsulateP2P(addr)
|
|
if err == nil {
|
|
result = append(result, addr)
|
|
}
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func selectCircuitRelayListenAddresses(addresses []ma.Multiaddr) ([]ma.Multiaddr, error) {
|
|
var result []ma.Multiaddr
|
|
for _, addr := range addresses {
|
|
addr, err := decapsulateCircuitRelayAddr(addr)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
result = append(result, addr)
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func (w *WakuNode) getENRAddresses(addrs []ma.Multiaddr) (extAddr *net.TCPAddr, multiaddr []ma.Multiaddr, err error) {
|
|
|
|
extAddr, err = selectMostExternalAddress(addrs)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
wssAddrs, err := selectWSSListenAddresses(addrs)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
multiaddr = append(multiaddr, wssAddrs...)
|
|
|
|
// to use WSS, you should have a valid certificate with a domain name.
|
|
// that means you're reachable. So circuit relay addresses are ignored
|
|
if len(wssAddrs) == 0 {
|
|
circuitAddrs, err := selectCircuitRelayListenAddresses(addrs)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
multiaddr = append(multiaddr, circuitAddrs...)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func (w *WakuNode) setupENR(ctx context.Context, addrs []ma.Multiaddr) error {
|
|
ipAddr, multiaddresses, err := w.getENRAddresses(addrs)
|
|
if err != nil {
|
|
w.log.Error("obtaining external address", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
err = w.updateLocalNode(w.localNode, multiaddresses, ipAddr, w.opts.udpPort, w.wakuFlag, w.opts.advertiseAddrs, w.opts.discV5autoUpdate, w.log)
|
|
if err != nil {
|
|
w.log.Error("updating localnode ENR record", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
if w.Relay() != nil {
|
|
err = w.watchTopicShards(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
func (w *WakuNode) watchTopicShards(ctx context.Context) error {
|
|
evtRelaySubscribed, err := w.Relay().Events().Subscribe(new(relay.EvtRelaySubscribed))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
evtRelayUnsubscribed, err := w.Relay().Events().Subscribe(new(relay.EvtRelayUnsubscribed))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
go func() {
|
|
defer evtRelaySubscribed.Close()
|
|
defer evtRelayUnsubscribed.Close()
|
|
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case <-evtRelayUnsubscribed.Out():
|
|
case <-evtRelaySubscribed.Out():
|
|
topics := w.Relay().Topics()
|
|
rs, err := protocol.TopicsToRelayShards(topics...)
|
|
if err != nil {
|
|
w.log.Warn("could not set ENR shard info", zap.Error(err))
|
|
continue
|
|
}
|
|
|
|
if len(rs) > 0 {
|
|
if len(rs) > 1 {
|
|
w.log.Warn("could not set ENR shard info", zap.String("error", "multiple clusters found, use sharded topics within the same cluster"))
|
|
continue
|
|
}
|
|
}
|
|
|
|
if len(rs) == 1 {
|
|
w.log.Info("updating advertised relay shards in ENR")
|
|
if len(rs[0].Indices) != len(topics) {
|
|
w.log.Warn("A mix of named and static shards found. ENR shard will contain only the following shards", zap.Any("shards", rs[0]))
|
|
}
|
|
|
|
err = wenr.Update(w.localNode, wenr.WithWakuRelaySharding(rs[0]))
|
|
if err != nil {
|
|
w.log.Warn("could not set ENR shard info", zap.Error(err))
|
|
continue
|
|
}
|
|
|
|
w.enrChangeCh <- struct{}{}
|
|
}
|
|
}
|
|
}
|
|
}()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (w *WakuNode) registerAndMonitorReachability(ctx context.Context) {
|
|
var myEventSub event.Subscription
|
|
var err error
|
|
if myEventSub, err = w.host.EventBus().Subscribe(new(event.EvtLocalReachabilityChanged)); err != nil {
|
|
w.log.Error("failed to register with libp2p for reachability status", zap.Error(err))
|
|
return
|
|
}
|
|
w.wg.Add(1)
|
|
go func() {
|
|
defer myEventSub.Close()
|
|
defer w.wg.Done()
|
|
|
|
for {
|
|
select {
|
|
case evt := <-myEventSub.Out():
|
|
reachability := evt.(event.EvtLocalReachabilityChanged).Reachability
|
|
w.log.Info("Node reachability changed", zap.Stringer("newReachability", reachability))
|
|
case <-ctx.Done():
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
}
|