2023-11-21 15:16:15 +00:00
|
|
|
# Fluffy
|
2024-02-28 17:31:45 +00:00
|
|
|
# Copyright (c) 2021-2024 Status Research & Development GmbH
|
2023-01-31 12:38:08 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
{.push raises: [].}
|
|
|
|
|
2024-02-28 17:31:45 +00:00
|
|
|
import std/strutils, confutils, chronos, stint, eth/p2p/discoveryv5/routing_table
|
2022-01-18 08:01:22 +00:00
|
|
|
|
|
|
|
type
|
2022-05-12 16:04:37 +00:00
|
|
|
RadiusConfigKind* = enum
|
2024-02-28 17:31:45 +00:00
|
|
|
Static
|
|
|
|
Dynamic
|
2022-05-12 16:04:37 +00:00
|
|
|
|
|
|
|
RadiusConfig* = object
|
|
|
|
case kind*: RadiusConfigKind
|
|
|
|
of Static:
|
|
|
|
logRadius*: uint16
|
|
|
|
of Dynamic:
|
|
|
|
discard
|
|
|
|
|
2022-01-18 08:01:22 +00:00
|
|
|
PortalProtocolConfig* = object
|
|
|
|
tableIpLimits*: TableIpLimits
|
|
|
|
bitsPerHop*: int
|
2022-05-12 16:04:37 +00:00
|
|
|
radiusConfig*: RadiusConfig
|
2023-08-30 08:01:00 +00:00
|
|
|
disablePoke*: bool
|
2022-01-18 08:01:22 +00:00
|
|
|
|
|
|
|
const
|
2022-05-12 16:04:37 +00:00
|
|
|
defaultRadiusConfig* = RadiusConfig(kind: Dynamic)
|
2022-05-23 21:23:24 +00:00
|
|
|
defaultRadiusConfigDesc* = $defaultRadiusConfig.kind
|
2023-08-30 08:01:00 +00:00
|
|
|
defaultDisablePoke* = false
|
2023-10-05 17:29:39 +00:00
|
|
|
revalidationTimeout* = chronos.seconds(30)
|
2022-05-12 16:04:37 +00:00
|
|
|
|
2022-01-18 08:01:22 +00:00
|
|
|
defaultPortalProtocolConfig* = PortalProtocolConfig(
|
2023-10-20 12:30:21 +00:00
|
|
|
# TODO / IMPORTANT NOTE:
|
|
|
|
# This must be set back to `DefaultTableIpLimits` as soon as there are
|
|
|
|
# enough nodes in the Portal network that we don't need to rely on the
|
|
|
|
# Fluffy fleet. Currently, during development, convenience is taken above
|
|
|
|
# security, this must not remain.
|
|
|
|
tableIpLimits: TableIpLimits(tableIpLimit: 32, bucketIpLimit: 16),
|
2022-05-12 16:04:37 +00:00
|
|
|
bitsPerHop: DefaultBitsPerHop,
|
2024-02-28 17:31:45 +00:00
|
|
|
radiusConfig: defaultRadiusConfig,
|
2022-05-12 16:04:37 +00:00
|
|
|
)
|
2022-01-18 08:01:22 +00:00
|
|
|
|
|
|
|
proc init*(
|
|
|
|
T: type PortalProtocolConfig,
|
|
|
|
tableIpLimit: uint,
|
|
|
|
bucketIpLimit: uint,
|
2022-05-12 16:04:37 +00:00
|
|
|
bitsPerHop: int,
|
2023-08-30 08:01:00 +00:00
|
|
|
radiusConfig: RadiusConfig,
|
2024-02-28 17:31:45 +00:00
|
|
|
disablePoke: bool,
|
|
|
|
): T =
|
2022-01-18 08:01:22 +00:00
|
|
|
PortalProtocolConfig(
|
2024-02-28 17:31:45 +00:00
|
|
|
tableIpLimits:
|
|
|
|
TableIpLimits(tableIpLimit: tableIpLimit, bucketIpLimit: bucketIpLimit),
|
2022-05-12 16:04:37 +00:00
|
|
|
bitsPerHop: bitsPerHop,
|
2023-08-30 08:01:00 +00:00
|
|
|
radiusConfig: radiusConfig,
|
2024-02-28 17:31:45 +00:00
|
|
|
disablePoke: disablePoke,
|
2022-01-18 08:01:22 +00:00
|
|
|
)
|
|
|
|
|
2023-11-23 17:49:15 +00:00
|
|
|
func fromLogRadius*(T: type UInt256, logRadius: uint16): T =
|
2023-11-21 15:16:15 +00:00
|
|
|
# Get the max value of the logRadius range
|
|
|
|
pow((2).stuint(256), logRadius) - 1
|
|
|
|
|
2023-11-23 17:49:15 +00:00
|
|
|
func getInitialRadius*(rc: RadiusConfig): UInt256 =
|
2023-11-21 15:16:15 +00:00
|
|
|
case rc.kind
|
|
|
|
of Static:
|
|
|
|
return UInt256.fromLogRadius(rc.logRadius)
|
|
|
|
of Dynamic:
|
|
|
|
# In case of a dynamic radius we start from the maximum value to quickly
|
|
|
|
# gather as much data as possible, and also make sure each data piece in
|
|
|
|
# the database is in our range after a node restart.
|
|
|
|
# Alternative would be to store node the radius in database, and initialize
|
|
|
|
# it from database after a restart
|
|
|
|
return UInt256.high()
|
|
|
|
|
|
|
|
## Confutils parsers
|
|
|
|
|
2024-02-28 17:31:45 +00:00
|
|
|
proc parseCmdArg*(T: type RadiusConfig, p: string): T {.raises: [ValueError].} =
|
2022-05-12 16:04:37 +00:00
|
|
|
if p.startsWith("dynamic") and len(p) == 7:
|
2022-05-23 21:23:24 +00:00
|
|
|
RadiusConfig(kind: Dynamic)
|
2022-05-12 16:04:37 +00:00
|
|
|
elif p.startsWith("static:"):
|
2024-02-28 17:31:45 +00:00
|
|
|
let num = p[7 ..^ 1]
|
2022-05-23 21:23:24 +00:00
|
|
|
let parsed =
|
|
|
|
try:
|
|
|
|
uint16.parseCmdArg(num)
|
|
|
|
except ValueError:
|
|
|
|
let msg = "Provided logRadius: " & num & " is not a valid number"
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, msg)
|
2022-05-12 16:04:37 +00:00
|
|
|
|
2022-05-23 21:23:24 +00:00
|
|
|
if parsed > 256:
|
2024-02-28 17:31:45 +00:00
|
|
|
raise newException(ValueError, "Provided logRadius should be <= 256")
|
2022-05-23 21:23:24 +00:00
|
|
|
|
|
|
|
RadiusConfig(kind: Static, logRadius: parsed)
|
2022-05-12 16:04:37 +00:00
|
|
|
else:
|
2022-05-23 21:23:24 +00:00
|
|
|
let parsed =
|
|
|
|
try:
|
|
|
|
uint16.parseCmdArg(p)
|
|
|
|
except ValueError:
|
|
|
|
let msg =
|
|
|
|
"Not supported radius config option: " & p & " . " &
|
|
|
|
"Supported options: dynamic and static:logRadius"
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, msg)
|
2022-05-23 21:23:24 +00:00
|
|
|
|
|
|
|
if parsed > 256:
|
2024-02-28 17:31:45 +00:00
|
|
|
raise newException(ValueError, "Provided logRadius should be <= 256")
|
2022-05-23 21:23:24 +00:00
|
|
|
|
|
|
|
RadiusConfig(kind: Static, logRadius: parsed)
|
2022-05-12 16:04:37 +00:00
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc completeCmdArg*(T: type RadiusConfig, val: string): seq[string] =
|
2022-05-12 16:04:37 +00:00
|
|
|
return @[]
|