Clean up logging and some exception handling

This commit is contained in:
kdeme 2020-02-17 17:44:56 +01:00 committed by zah
parent bb6a3c2ce1
commit 5daaf73d2e
6 changed files with 72 additions and 73 deletions

View File

@ -1,6 +1,6 @@
import std/net
import types, ../enode
import eth/trie/db
import
std/net,
eth/trie/db, types, ../enode
type
DiscoveryDB* = ref object of Database

View File

@ -1,5 +1,6 @@
import std/tables
import types, node, enr, hkdf, ../enode, eth/[rlp, keys], nimcrypto, stint
import
std/tables, nimcrypto, stint, chronicles,
types, node, enr, hkdf, ../enode, eth/[rlp, keys]
const
idNoncePrefix = "discovery-id-nonce"
@ -179,13 +180,13 @@ proc decodePacketBody(typ: byte, body: openarray[byte], res: var Packet): bool =
decode(findNode)
decode(nodes)
else:
echo "unknown packet: ", typ
debug "unknown packet type ", typ
return true
proc decodeAuthResp(c: Codec, fromId: NodeId, head: AuthHeader, challenge: Whoareyou, secrets: var HandshakeSecrets, newNode: var Node): bool =
if head.scheme != authSchemeName:
echo "Unknown auth scheme"
warn "Unknown auth scheme"
return false
var ephKey: PublicKey
@ -207,7 +208,7 @@ proc decodeEncrypted*(c: var Codec, fromId: NodeID, fromAddr: Address, input: se
var auth: AuthHeader
var readKey: array[16, byte]
if r.isList:
# Handshake
# Handshake - rlp list indicates auth-header
# TODO: Auth failure will result in resending whoareyou. Do we really want this?
auth = r.read(AuthHeader)
@ -231,6 +232,7 @@ proc decodeEncrypted*(c: var Codec, fromId: NodeID, fromAddr: Address, input: se
readKey = sec.readKey
else:
# Message packet or random packet - rlp bytes (size 12) indicates auth-tag
authTag = r.read(array[12, byte])
auth.auth = authTag
var writeKey: array[16, byte]

View File

@ -1,6 +1,6 @@
import std/[net, endians, hashes]
import nimcrypto, stint
import types, enr, eth/keys, ../enode
import
std/[net, endians, hashes], nimcrypto, stint, chronicles,
types, enr, eth/keys, ../enode
type
Node* = ref object
@ -34,7 +34,7 @@ proc newNode*(r: Record): Node =
var pk: PublicKey
if recoverPublicKey(r.get("secp256k1", seq[byte]), pk) != EthKeysStatus.Success:
echo "Could not recover public key"
warn "Could not recover public key"
return
let a = Address(ip: IpAddress(family: IpAddressFamily.IPv4,

View File

@ -51,7 +51,7 @@ proc start*(p: Protocol) =
discard
proc send(d: Protocol, a: Address, data: seq[byte]) =
# echo "Sending ", data.len, " bytes to ", a
# debug "Sending bytes", amount = data.len, to = a
let ta = initTAddress(a.ip, a.udpPort)
let f = d.transp.sendTo(ta, data)
f.callback = proc(data: pointer) {.gcsafe.} =
@ -123,14 +123,13 @@ proc handleFindNode(d: Protocol, fromNode: Node, fn: FindNodePacket, reqId: Requ
let distance = min(fn.distance, 256)
d.sendNodes(fromNode, reqId, d.routingTable.neighboursAtDistance(distance))
proc receive*(d: Protocol, a: Address, msg: Bytes) {.gcsafe.} =
## Can raise `DiscProtocolError` and all of `RlpError`
# Note: export only needed for testing
proc receive(d: Protocol, a: Address, msg: Bytes)
{.gcsafe, raises:[RlpError, Exception].} =
# TODO: figure out where the general exception comes from and clean it up
if msg.len < 32:
return # Invalid msg
try:
# echo "Packet received: ", msg.len
# debug "Packet received: ", length = msg.len
if d.isWhoAreYou(msg):
let whoareyou = d.decodeWhoAreYou(msg)
@ -155,7 +154,7 @@ proc receive*(d: Protocol, a: Address, msg: Bytes) {.gcsafe.} =
if node.isNil:
node = d.routingTable.getNode(sender)
else:
echo "Adding new node to routing table"
debug "Adding new node to routing table"
discard d.routingTable.addNode(node)
doAssert(not node.isNil, "No node in the routing table (internal error?)")
@ -170,16 +169,12 @@ proc receive*(d: Protocol, a: Address, msg: Bytes) {.gcsafe.} =
if d.awaitedPackets.take((node, packet.reqId), waiter):
waiter.complete(packet.some)
else:
echo "TODO: handle packet: ", packet.kind, " from ", node
debug "TODO: handle packet: ", packet = packet.kind, origin = node
else:
echo "Could not decode, respond with whoareyou"
debug "Could not decode, respond with whoareyou"
d.sendWhoareyou(a, sender, authTag)
except Exception as e:
echo "Exception: ", e.msg
echo e.getStackTrace()
proc waitPacket(d: Protocol, fromNode: Node, reqId: RequestId): Future[Option[Packet]] =
result = newFuture[Option[Packet]]("waitPacket")
let res = result
@ -229,7 +224,7 @@ proc lookupWorker(p: Protocol, destNode: Node, target: NodeId): Future[seq[Node]
var i = 0
while i < lookupRequestLimit and result.len < findNodeResultLimit:
let r = await p.findNode(destNode, dists[i])
# TODO: Handle falures
# TODO: Handle failures
result.add(r)
inc i
@ -284,11 +279,12 @@ proc processClient(transp: DatagramTransport,
var buf = transp.getMessage()
let a = Address(ip: raddr.address, udpPort: raddr.port, tcpPort: raddr.port)
proto.receive(a, buf)
except RlpError:
debug "Receive failed", err = getCurrentExceptionMsg()
except:
debug "Receive failed", err = getCurrentExceptionMsg()
raise
except RlpError as e:
debug "Receive failed", exception = e.name, msg = e.msg
# TODO: what else can be raised? Figure this out and be more restrictive?
except CatchableError as e:
debug "Receive failed", exception = e.name, msg = e.msg,
stacktrace = e.getStackTrace()
proc revalidateNode(p: Protocol, n: Node) {.async.} =
let reqId = newRequestId()

View File

@ -1,6 +1,6 @@
import std/[algorithm, times, sequtils, bitops, random, sets]
import types, node
import stint, chronicles
import
std/[algorithm, times, sequtils, bitops, random, sets], stint, chronicles,
types, node
type
RoutingTable* = object

View File

@ -1,5 +1,6 @@
import hashes
import ../enode, enr, stint
import
hashes, stint,
../enode, enr
type
NodeId* = UInt256