2021-07-09 11:34:16 +00:00
|
|
|
# Nimbus - Portal Network
|
2022-04-13 05:56:01 +00:00
|
|
|
# Copyright (c) 2021-2022 Status Research & Development GmbH
|
2021-07-09 11:34:16 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
2021-10-20 20:31:05 +00:00
|
|
|
## Implementation of the Portal wire protocol as specified at:
|
|
|
|
## https://github.com/ethereum/portal-network-specs/blob/master/portal-wire-protocol.md
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
{.push raises: [Defect].}
|
|
|
|
|
|
|
|
import
|
2021-07-30 19:19:03 +00:00
|
|
|
std/[sequtils, sets, algorithm],
|
2022-06-24 13:35:31 +00:00
|
|
|
stew/[results, byteutils, leb128], chronicles, chronos, nimcrypto/hash,
|
|
|
|
bearssl, ssz_serialization, metrics, faststreams,
|
2022-01-14 15:07:14 +00:00
|
|
|
eth/rlp, eth/p2p/discoveryv5/[protocol, node, enr, routing_table, random2,
|
2022-01-19 14:56:14 +00:00
|
|
|
nodes_verification, lru],
|
2022-07-20 10:46:42 +00:00
|
|
|
".."/../[content_db, seed_db],
|
2022-01-18 08:01:22 +00:00
|
|
|
"."/[portal_stream, portal_protocol_config],
|
2021-09-20 10:55:03 +00:00
|
|
|
./messages
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-10-09 11:22:03 +00:00
|
|
|
export messages, routing_table
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-03-23 15:32:59 +00:00
|
|
|
declareCounter portal_message_requests_incoming,
|
|
|
|
"Portal wire protocol incoming message requests",
|
|
|
|
labels = ["protocol_id", "message_type"]
|
|
|
|
declareCounter portal_message_decoding_failures,
|
|
|
|
"Portal wire protocol message decoding failures",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
declareCounter portal_message_requests_outgoing,
|
|
|
|
"Portal wire protocol outgoing message requests",
|
|
|
|
labels = ["protocol_id", "message_type"]
|
|
|
|
declareCounter portal_message_response_incoming,
|
|
|
|
"Portal wire protocol incoming message responses",
|
|
|
|
labels = ["protocol_id", "message_type"]
|
|
|
|
|
|
|
|
const requestBuckets = [1.0, 3.0, 5.0, 7.0, 9.0, Inf]
|
|
|
|
declareHistogram portal_lookup_node_requests,
|
|
|
|
"Portal wire protocol amount of requests per node lookup",
|
|
|
|
labels = ["protocol_id"], buckets = requestBuckets
|
|
|
|
declareHistogram portal_lookup_content_requests,
|
|
|
|
"Portal wire protocol amount of requests per node lookup",
|
|
|
|
labels = ["protocol_id"], buckets = requestBuckets
|
|
|
|
declareCounter portal_lookup_content_failures,
|
|
|
|
"Portal wire protocol content lookup failures",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
|
|
|
|
const contentKeysBuckets = [0.0, 1.0, 2.0, 4.0, 8.0, 16.0, 32.0, 64.0, Inf]
|
|
|
|
declareHistogram portal_content_keys_offered,
|
|
|
|
"Portal wire protocol amount of content keys per offer message send",
|
|
|
|
labels = ["protocol_id"], buckets = contentKeysBuckets
|
|
|
|
declareHistogram portal_content_keys_accepted,
|
|
|
|
"Portal wire protocol amount of content keys per accept message received",
|
|
|
|
labels = ["protocol_id"], buckets = contentKeysBuckets
|
2022-04-01 16:01:50 +00:00
|
|
|
declareCounter portal_gossip_offers_successful,
|
|
|
|
"Portal wire protocol successful content offers from neighborhood gossip",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
declareCounter portal_gossip_offers_failed,
|
|
|
|
"Portal wire protocol failed content offers from neighborhood gossip",
|
|
|
|
labels = ["protocol_id"]
|
2022-05-07 11:50:16 +00:00
|
|
|
declareCounter portal_gossip_with_lookup,
|
|
|
|
"Portal wire protocol neighborhood gossip that required a node lookup",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
declareCounter portal_gossip_without_lookup,
|
|
|
|
"Portal wire protocol neighborhood gossip that did not require a node lookup",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
|
2022-03-23 15:32:59 +00:00
|
|
|
|
2022-03-24 20:06:13 +00:00
|
|
|
# Note: These metrics are to get some idea on how many enrs are send on average.
|
|
|
|
# Relevant issue: https://github.com/ethereum/portal-network-specs/issues/136
|
|
|
|
const enrsBuckets = [0.0, 1.0, 3.0, 5.0, 8.0, 9.0, Inf]
|
|
|
|
declareHistogram portal_nodes_enrs_packed,
|
|
|
|
"Portal wire protocol amount of enrs packed in a nodes message",
|
|
|
|
labels = ["protocol_id"], buckets = enrsBuckets
|
|
|
|
# This one will currently hit the max numbers because all neighbours are send,
|
|
|
|
# not only the ones closer to the content.
|
|
|
|
declareHistogram portal_content_enrs_packed,
|
|
|
|
"Portal wire protocol amount of enrs packed in a content message",
|
|
|
|
labels = ["protocol_id"], buckets = enrsBuckets
|
|
|
|
|
2022-05-17 10:47:24 +00:00
|
|
|
declareCounter portal_pruning_counter,
|
|
|
|
"Number of pruning event which happened during node lifetime",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
|
|
|
|
declareGauge portal_pruning_deleted_elements,
|
|
|
|
"Number of elements delted in last pruning",
|
|
|
|
labels = ["protocol_id"]
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
logScope:
|
2021-09-22 15:07:14 +00:00
|
|
|
topics = "portal_wire"
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
const
|
2021-12-08 10:54:22 +00:00
|
|
|
alpha = 3 ## Kademlia concurrency factor
|
2021-12-20 10:57:55 +00:00
|
|
|
enrsResultLimit* = 32 ## Maximum amount of ENRs in the total Nodes messages
|
2021-09-15 09:24:03 +00:00
|
|
|
## that will be processed
|
2021-12-08 10:54:22 +00:00
|
|
|
refreshInterval = 5.minutes ## Interval of launching a random query to
|
2021-07-30 19:19:03 +00:00
|
|
|
## refresh the routing table.
|
2021-12-08 10:54:22 +00:00
|
|
|
revalidateMax = 10000 ## Revalidation of a peer is done between 0 and this
|
2021-07-30 19:19:03 +00:00
|
|
|
## value in milliseconds
|
2021-12-08 10:54:22 +00:00
|
|
|
initialLookups = 1 ## Amount of lookups done when populating the routing table
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-03-24 20:06:13 +00:00
|
|
|
# TalkResp message is a response message so the session is established and a
|
|
|
|
# regular discv5 packet is assumed for size calculation.
|
|
|
|
# Regular message = IV + header + message
|
|
|
|
# talkResp message = rlp: [request-id, response]
|
|
|
|
talkRespOverhead =
|
|
|
|
16 + # IV size
|
|
|
|
55 + # header size
|
|
|
|
1 + # talkResp msg id
|
|
|
|
3 + # rlp encoding outer list, max length will be encoded in 2 bytes
|
|
|
|
9 + # request id (max = 8) + 1 byte from rlp encoding byte string
|
|
|
|
3 + # rlp encoding response byte string, max length in 2 bytes
|
|
|
|
16 # HMAC
|
|
|
|
|
2022-04-01 16:01:50 +00:00
|
|
|
# These are the concurrent offers per Portal wire protocol that is running.
|
|
|
|
# Using the `offerQueue` allows for limiting the amount of offers send and
|
|
|
|
# thus how many streams can be started.
|
|
|
|
# TODO:
|
|
|
|
# More thought needs to go into this as it is currently on a per network
|
|
|
|
# basis. Keep it simple like that? Or limit it better at the stream transport
|
|
|
|
# level? In the latter case, this might still need to be checked/blocked at
|
|
|
|
# the very start of sending the offer, because blocking/waiting too long
|
|
|
|
# between the received accept message and actually starting the stream and
|
|
|
|
# sending data could give issues due to timeouts on the other side.
|
|
|
|
# And then there are still limits to be applied also for FindContent and the
|
|
|
|
# incoming directions.
|
|
|
|
concurrentOffers = 50
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
type
|
2022-01-06 08:06:05 +00:00
|
|
|
ToContentIdHandler* =
|
|
|
|
proc(contentKey: ByteList): Option[ContentId] {.raises: [Defect], gcsafe.}
|
2021-09-03 08:57:19 +00:00
|
|
|
|
2022-08-01 19:00:21 +00:00
|
|
|
DbGetHandler* =
|
|
|
|
proc(contentDB: ContentDB, contentKey: ByteList):
|
|
|
|
(Option[ContentId], Option[seq[byte]]) {.raises: [Defect], gcsafe.}
|
|
|
|
|
2021-10-20 20:31:05 +00:00
|
|
|
PortalProtocolId* = array[2, byte]
|
|
|
|
|
2022-01-19 14:56:14 +00:00
|
|
|
RadiusCache* = LRUCache[NodeId, UInt256]
|
2022-04-11 17:42:38 +00:00
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
ContentInfo* = object
|
|
|
|
contentKey*: ByteList
|
|
|
|
content*: seq[byte]
|
|
|
|
|
|
|
|
OfferRequestType = enum
|
|
|
|
Direct, Database
|
|
|
|
|
|
|
|
OfferRequest = object
|
|
|
|
dst: Node
|
|
|
|
case kind: OfferRequestType
|
|
|
|
of Direct:
|
|
|
|
contentList: List[ContentInfo, contentKeysLimit]
|
|
|
|
of Database:
|
|
|
|
contentKeys: ContentKeysList
|
2022-01-19 14:56:14 +00:00
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
PortalProtocol* = ref object of TalkProtocol
|
2022-03-18 12:06:57 +00:00
|
|
|
protocolId*: PortalProtocolId
|
2021-10-09 11:22:03 +00:00
|
|
|
routingTable*: RoutingTable
|
2021-07-09 11:34:16 +00:00
|
|
|
baseProtocol*: protocol.Protocol
|
2022-01-06 08:06:05 +00:00
|
|
|
contentDB*: ContentDB
|
2022-05-24 11:27:22 +00:00
|
|
|
toContentId*: ToContentIdHandler
|
2022-08-01 19:00:21 +00:00
|
|
|
dbGet*: DbGetHandler
|
2022-05-12 16:04:37 +00:00
|
|
|
radiusConfig: RadiusConfig
|
2021-07-09 11:34:16 +00:00
|
|
|
dataRadius*: UInt256
|
2021-09-23 12:26:41 +00:00
|
|
|
bootstrapRecords*: seq[Record]
|
2021-07-30 19:19:03 +00:00
|
|
|
lastLookup: chronos.Moment
|
|
|
|
refreshLoop: Future[void]
|
|
|
|
revalidateLoop: Future[void]
|
2022-02-11 13:43:10 +00:00
|
|
|
stream*: PortalStream
|
2022-01-19 14:56:14 +00:00
|
|
|
radiusCache: RadiusCache
|
2022-04-11 09:25:36 +00:00
|
|
|
offerQueue: AsyncQueue[OfferRequest]
|
2022-04-01 16:01:50 +00:00
|
|
|
offerWorkers: seq[Future[void]]
|
2021-07-30 19:19:03 +00:00
|
|
|
|
|
|
|
PortalResult*[T] = Result[T, cstring]
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
FoundContentKind* = enum
|
|
|
|
Nodes,
|
|
|
|
Content
|
2021-09-02 12:35:25 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
FoundContent* = object
|
2022-04-06 11:47:23 +00:00
|
|
|
src*: Node
|
2022-01-14 15:07:14 +00:00
|
|
|
case kind*: FoundContentKind
|
2021-09-02 12:35:25 +00:00
|
|
|
of Content:
|
2022-01-20 20:21:20 +00:00
|
|
|
content*: seq[byte]
|
2022-01-14 15:07:14 +00:00
|
|
|
of Nodes:
|
|
|
|
nodes*: seq[Node]
|
2021-08-20 14:02:29 +00:00
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
ContentLookupResult* = object
|
|
|
|
content*: seq[byte]
|
|
|
|
# List of nodes which do not have requested content, and for which
|
|
|
|
# content is in their range
|
|
|
|
nodesInterestedInContent*: seq[Node]
|
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
proc init*(
|
2022-04-11 17:42:38 +00:00
|
|
|
T: type ContentInfo,
|
2022-04-11 09:25:36 +00:00
|
|
|
contentKey: ByteList,
|
|
|
|
content: seq[byte]): T =
|
|
|
|
ContentInfo(
|
|
|
|
contentKey: contentKey,
|
|
|
|
content: content
|
|
|
|
)
|
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
proc init*(
|
2022-04-11 17:42:38 +00:00
|
|
|
T: type ContentLookupResult,
|
|
|
|
content: seq[byte],
|
2022-04-06 11:47:23 +00:00
|
|
|
nodesInterestedInContent: seq[Node]): T =
|
|
|
|
ContentLookupResult(
|
2022-04-11 17:42:38 +00:00
|
|
|
content: content,
|
2022-04-06 11:47:23 +00:00
|
|
|
nodesInterestedInContent: nodesInterestedInContent
|
|
|
|
)
|
|
|
|
|
2022-03-17 12:19:36 +00:00
|
|
|
func `$`(id: PortalProtocolId): string =
|
|
|
|
id.toHex()
|
|
|
|
|
2021-08-20 14:02:29 +00:00
|
|
|
proc addNode*(p: PortalProtocol, node: Node): NodeStatus =
|
|
|
|
p.routingTable.addNode(node)
|
|
|
|
|
2021-09-23 12:26:41 +00:00
|
|
|
proc addNode*(p: PortalProtocol, r: Record): bool =
|
|
|
|
let node = newNode(r)
|
|
|
|
if node.isOk():
|
|
|
|
p.addNode(node[]) == Added
|
|
|
|
else:
|
|
|
|
false
|
|
|
|
|
|
|
|
func localNode*(p: PortalProtocol): Node = p.baseProtocol.localNode
|
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
func neighbours*(p: PortalProtocol, id: NodeId, seenOnly = false): seq[Node] =
|
2021-08-20 14:02:29 +00:00
|
|
|
p.routingTable.neighbours(id = id, seenOnly = seenOnly)
|
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
proc inRange(
|
|
|
|
p: PortalProtocol,
|
2022-04-11 17:42:38 +00:00
|
|
|
nodeId: NodeId,
|
2022-09-10 19:00:27 +00:00
|
|
|
nodeRadius: UInt256,
|
2022-04-06 11:47:23 +00:00
|
|
|
contentId: ContentId): bool =
|
|
|
|
let distance = p.routingTable.distance(nodeId, contentId)
|
|
|
|
distance <= nodeRadius
|
|
|
|
|
2022-01-06 08:06:05 +00:00
|
|
|
func inRange*(p: PortalProtocol, contentId: ContentId): bool =
|
2022-04-06 11:47:23 +00:00
|
|
|
p.inRange(p.localNode.id, p.dataRadius, contentId)
|
2022-01-06 08:06:05 +00:00
|
|
|
|
2022-03-24 20:06:13 +00:00
|
|
|
func truncateEnrs(
|
|
|
|
nodes: seq[Node], maxSize: int, enrOverhead: int): List[ByteList, 32] =
|
|
|
|
var enrs: List[ByteList, 32]
|
|
|
|
var totalSize = 0
|
|
|
|
for n in nodes:
|
|
|
|
let enr = ByteList.init(n.record.raw)
|
|
|
|
if totalSize + enr.len() + enrOverhead <= maxSize:
|
|
|
|
let res = enrs.add(enr) # 32 limit will not be reached
|
|
|
|
totalSize = totalSize + enr.len()
|
|
|
|
else:
|
|
|
|
break
|
|
|
|
|
|
|
|
enrs
|
|
|
|
|
2022-01-19 14:56:14 +00:00
|
|
|
func handlePing(
|
|
|
|
p: PortalProtocol, ping: PingMessage, srcId: NodeId): seq[byte] =
|
|
|
|
# TODO: This should become custom per Portal Network
|
|
|
|
# TODO: Need to think about the effect of malicious actor sending lots of
|
|
|
|
# pings from different nodes to clear the LRU.
|
|
|
|
let customPayloadDecoded =
|
|
|
|
try: SSZ.decode(ping.customPayload.asSeq(), CustomPayload)
|
|
|
|
except MalformedSszError, SszSizeMismatchError:
|
|
|
|
# invalid custom payload, send empty back
|
|
|
|
return @[]
|
|
|
|
p.radiusCache.put(srcId, customPayloadDecoded.dataRadius)
|
|
|
|
|
2021-10-13 19:35:54 +00:00
|
|
|
let customPayload = CustomPayload(dataRadius: p.dataRadius)
|
2021-07-09 11:34:16 +00:00
|
|
|
let p = PongMessage(enrSeq: p.baseProtocol.localNode.record.seqNum,
|
2021-10-13 19:35:54 +00:00
|
|
|
customPayload: ByteList(SSZ.encode(customPayload)))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
encodeMessage(p)
|
|
|
|
|
2022-03-24 20:06:13 +00:00
|
|
|
proc handleFindNodes(p: PortalProtocol, fn: FindNodesMessage): seq[byte] =
|
2021-07-09 11:34:16 +00:00
|
|
|
if fn.distances.len == 0:
|
|
|
|
let enrs = List[ByteList, 32](@[])
|
|
|
|
encodeMessage(NodesMessage(total: 1, enrs: enrs))
|
|
|
|
elif fn.distances.contains(0):
|
|
|
|
# A request for our own record.
|
|
|
|
let enr = ByteList(rlp.encode(p.baseProtocol.localNode.record))
|
|
|
|
encodeMessage(NodesMessage(total: 1, enrs: List[ByteList, 32](@[enr])))
|
|
|
|
else:
|
2021-07-13 13:15:33 +00:00
|
|
|
let distances = fn.distances.asSeq()
|
|
|
|
if distances.all(proc (x: uint16): bool = return x <= 256):
|
|
|
|
let
|
2021-07-30 19:19:03 +00:00
|
|
|
nodes = p.routingTable.neighboursAtDistances(distances, seenOnly = true)
|
2021-07-13 13:15:33 +00:00
|
|
|
|
2022-03-24 20:06:13 +00:00
|
|
|
# TODO: Total amount of messages is set fixed to 1 for now, else we would
|
|
|
|
# need to either move the send of the talkresp messages here, or allow for
|
2021-07-13 13:15:33 +00:00
|
|
|
# returning multiple messages.
|
|
|
|
# On the long run, it might just be better to use a stream in these cases?
|
2022-03-24 20:06:13 +00:00
|
|
|
# Size calculation is done to truncate the ENR results in order to not go
|
|
|
|
# over the discv5 packet size limits. ENRs are sorted so the closest nodes
|
|
|
|
# will still be passed.
|
|
|
|
const
|
2022-05-03 07:18:33 +00:00
|
|
|
nodesOverhead = 1 + 1 + 4 # msg id + total + container offset
|
|
|
|
maxPayloadSize = maxDiscv5PacketSize - talkRespOverhead - nodesOverhead
|
2022-03-24 20:06:13 +00:00
|
|
|
enrOverhead = 4 # per added ENR, 4 bytes offset overhead
|
|
|
|
|
|
|
|
let enrs = truncateEnrs(nodes, maxPayloadSize, enrOverhead)
|
|
|
|
portal_nodes_enrs_packed.observe(enrs.len().int64)
|
|
|
|
|
|
|
|
encodeMessage(NodesMessage(total: 1, enrs: enrs))
|
2021-07-13 13:15:33 +00:00
|
|
|
else:
|
|
|
|
# invalid request, send empty back
|
|
|
|
let enrs = List[ByteList, 32](@[])
|
|
|
|
encodeMessage(NodesMessage(total: 1, enrs: enrs))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
proc handleFindContent(
|
|
|
|
p: PortalProtocol, fc: FindContentMessage, srcId: NodeId): seq[byte] =
|
2022-08-01 19:00:21 +00:00
|
|
|
const
|
|
|
|
contentOverhead = 1 + 1 # msg id + SSZ Union selector
|
|
|
|
maxPayloadSize = maxDiscv5PacketSize - talkRespOverhead - contentOverhead
|
|
|
|
enrOverhead = 4 # per added ENR, 4 bytes offset overhead
|
|
|
|
|
2022-09-10 19:00:27 +00:00
|
|
|
let (contentIdOpt, contentOpt) = p.dbGet(p.contentDB, fc.contentKey)
|
2022-08-01 19:00:21 +00:00
|
|
|
if contentOpt.isSome():
|
|
|
|
let content = contentOpt.get()
|
|
|
|
if content.len <= maxPayloadSize:
|
|
|
|
encodeMessage(ContentMessage(
|
|
|
|
contentMessageType: contentType, content: ByteList(content)))
|
|
|
|
else:
|
|
|
|
let connectionId = p.stream.addContentRequest(srcId, content)
|
2022-03-24 20:06:13 +00:00
|
|
|
|
2022-08-01 19:00:21 +00:00
|
|
|
encodeMessage(ContentMessage(
|
|
|
|
contentMessageType: connectionIdType, connectionId: connectionId))
|
|
|
|
elif contentIdOpt.isSome():
|
|
|
|
# Don't have the content, send closest neighbours to content id.
|
2021-07-13 13:15:33 +00:00
|
|
|
let
|
2022-08-01 19:00:21 +00:00
|
|
|
closestNodes = p.routingTable.neighbours(
|
|
|
|
NodeId(contentIdOpt.get()), seenOnly = true)
|
|
|
|
enrs = truncateEnrs(closestNodes, maxPayloadSize, enrOverhead)
|
|
|
|
portal_content_enrs_packed.observe(enrs.len().int64)
|
2022-03-24 20:06:13 +00:00
|
|
|
|
2022-08-01 19:00:21 +00:00
|
|
|
encodeMessage(ContentMessage(contentMessageType: enrsType, enrs: enrs))
|
2022-01-06 08:06:05 +00:00
|
|
|
else:
|
2022-08-01 19:00:21 +00:00
|
|
|
# Return empty response when:
|
|
|
|
# a. content key validation fails
|
|
|
|
# b. it is a special case such as "latest accumulator"
|
|
|
|
# TODO: Better would be to return no message at all for a, needs changes on
|
2022-01-06 08:06:05 +00:00
|
|
|
# discv5 layer.
|
2022-08-01 19:00:21 +00:00
|
|
|
# TODO: Better would be to have a specific protocol message for b.
|
2022-01-06 08:06:05 +00:00
|
|
|
@[]
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
proc handleOffer(p: PortalProtocol, o: OfferMessage, srcId: NodeId): seq[byte] =
|
|
|
|
var contentKeysBitList = ContentKeysBitList.init(o.contentKeys.len)
|
|
|
|
var contentKeys = ContentKeysList.init(@[])
|
2022-01-06 08:06:05 +00:00
|
|
|
# TODO: Do we need some protection against a peer offering lots (64x) of
|
|
|
|
# content that fits our Radius but is actually bogus?
|
|
|
|
# Additional TODO, but more of a specification clarification: What if we don't
|
|
|
|
# want any of the content? Reply with empty bitlist and a connectionId of
|
|
|
|
# all zeroes but don't actually allow an uTP connection?
|
|
|
|
for i, contentKey in o.contentKeys:
|
|
|
|
let contentIdOpt = p.toContentId(contentKey)
|
|
|
|
if contentIdOpt.isSome():
|
|
|
|
let contentId = contentIdOpt.get()
|
|
|
|
if p.inRange(contentId):
|
|
|
|
if not p.contentDB.contains(contentId):
|
2022-01-14 15:07:14 +00:00
|
|
|
contentKeysBitList.setBit(i)
|
|
|
|
discard contentKeys.add(contentKey)
|
2022-01-06 08:06:05 +00:00
|
|
|
else:
|
|
|
|
# Return empty response when content key validation fails
|
|
|
|
return @[]
|
|
|
|
|
2022-03-18 17:29:06 +00:00
|
|
|
let connectionId =
|
|
|
|
if contentKeysBitList.countOnes() != 0:
|
|
|
|
p.stream.addContentOffer(srcId, contentKeys)
|
|
|
|
else:
|
|
|
|
# When the node does not accept any of the content offered, reply with an
|
|
|
|
# all zeroes bitlist and connectionId.
|
|
|
|
# Note: What to do in this scenario is not defined in the Portal spec.
|
|
|
|
Bytes2([byte 0x00, 0x00])
|
2022-01-06 08:06:05 +00:00
|
|
|
|
2021-09-22 09:28:04 +00:00
|
|
|
encodeMessage(
|
2022-01-14 15:07:14 +00:00
|
|
|
AcceptMessage(connectionId: connectionId, contentKeys: contentKeysBitList))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-01-06 08:06:05 +00:00
|
|
|
proc messageHandler(protocol: TalkProtocol, request: seq[byte],
|
2021-09-07 13:56:51 +00:00
|
|
|
srcId: NodeId, srcUdpAddress: Address): seq[byte] =
|
2021-07-09 11:34:16 +00:00
|
|
|
doAssert(protocol of PortalProtocol)
|
|
|
|
|
2022-03-17 12:19:36 +00:00
|
|
|
logScope:
|
|
|
|
protocolId = p.protocolId
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
let p = PortalProtocol(protocol)
|
|
|
|
|
|
|
|
let decoded = decodeMessage(request)
|
|
|
|
if decoded.isOk():
|
|
|
|
let message = decoded.get()
|
2021-10-22 09:03:00 +00:00
|
|
|
trace "Received message request", srcId, srcUdpAddress, kind = message.kind
|
2021-11-16 16:50:08 +00:00
|
|
|
# Received a proper Portal message, check if this node exists in the base
|
|
|
|
# routing table and add if so.
|
2021-12-08 08:26:31 +00:00
|
|
|
# When the node exists in the base discv5 routing table it is likely that
|
|
|
|
# it will/would end up in the portal routing tables too but that is not
|
|
|
|
# certain as more nodes might exists on the base layer, and it will depend
|
|
|
|
# on the distance, order of lookups, etc.
|
|
|
|
# Note: Could add a findNodes with distance 0 call when not, and perhaps,
|
2021-11-16 16:50:08 +00:00
|
|
|
# optionally pass ENRs if the message was a discv5 handshake containing the
|
|
|
|
# ENR.
|
|
|
|
let node = p.baseProtocol.getNode(srcId)
|
|
|
|
if node.isSome():
|
|
|
|
discard p.routingTable.addNode(node.get())
|
|
|
|
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_message_requests_incoming.inc(
|
|
|
|
labelValues = [$p.protocolId, $message.kind])
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
case message.kind
|
|
|
|
of MessageKind.ping:
|
2022-01-19 14:56:14 +00:00
|
|
|
p.handlePing(message.ping, srcId)
|
2022-09-10 19:00:27 +00:00
|
|
|
of MessageKind.findNodes:
|
2021-12-08 10:54:22 +00:00
|
|
|
p.handleFindNodes(message.findNodes)
|
2022-09-10 19:00:27 +00:00
|
|
|
of MessageKind.findContent:
|
|
|
|
p.handleFindContent(message.findContent, srcId)
|
2021-09-22 09:28:04 +00:00
|
|
|
of MessageKind.offer:
|
2022-01-14 15:07:14 +00:00
|
|
|
p.handleOffer(message.offer, srcId)
|
2021-07-09 11:34:16 +00:00
|
|
|
else:
|
2021-11-17 16:11:17 +00:00
|
|
|
# This would mean a that Portal wire response message is being send over a
|
|
|
|
# discv5 talkreq message.
|
|
|
|
debug "Invalid Portal wire message type over talkreq", kind = message.kind
|
2021-07-09 11:34:16 +00:00
|
|
|
@[]
|
|
|
|
else:
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_message_decoding_failures.inc(labelValues = [$p.protocolId])
|
2021-10-22 09:03:00 +00:00
|
|
|
debug "Packet decoding error", error = decoded.error, srcId, srcUdpAddress
|
2021-07-09 11:34:16 +00:00
|
|
|
@[]
|
|
|
|
|
2022-05-12 16:04:37 +00:00
|
|
|
proc fromLogRadius(T: type UInt256, logRadius: uint16): T =
|
|
|
|
# Get the max value of the logRadius range
|
|
|
|
pow((2).stuint(256), logRadius) - 1
|
|
|
|
|
2022-07-05 12:42:55 +00:00
|
|
|
proc getInitialRadius(rc: RadiusConfig): UInt256 =
|
2022-05-12 16:04:37 +00:00
|
|
|
case rc.kind
|
|
|
|
of Static:
|
|
|
|
return UInt256.fromLogRadius(rc.logRadius)
|
|
|
|
of Dynamic:
|
|
|
|
# In case of a dynamic radius we start from the maximum value to quickly
|
|
|
|
# gather as much data as possible, and also make sure each data piece in
|
|
|
|
# the database is in our range after a node restart.
|
|
|
|
# Alternative would be to store node the radius in database, and initialize it
|
|
|
|
# from database after a restart
|
|
|
|
return UInt256.high()
|
|
|
|
|
2021-09-22 15:07:14 +00:00
|
|
|
proc new*(T: type PortalProtocol,
|
|
|
|
baseProtocol: protocol.Protocol,
|
2021-10-20 20:31:05 +00:00
|
|
|
protocolId: PortalProtocolId,
|
2022-01-06 08:06:05 +00:00
|
|
|
contentDB: ContentDB,
|
|
|
|
toContentId: ToContentIdHandler,
|
2022-08-01 19:00:21 +00:00
|
|
|
dbGet: DbGetHandler,
|
2022-08-17 07:32:06 +00:00
|
|
|
stream: PortalStream,
|
2021-12-13 08:06:29 +00:00
|
|
|
bootstrapRecords: openArray[Record] = [],
|
2022-01-18 08:01:22 +00:00
|
|
|
distanceCalculator: DistanceCalculator = XorDistanceCalculator,
|
|
|
|
config: PortalProtocolConfig = defaultPortalProtocolConfig
|
2021-10-05 19:16:33 +00:00
|
|
|
): T =
|
2022-01-18 08:01:22 +00:00
|
|
|
|
2022-05-12 16:04:37 +00:00
|
|
|
let initialRadius: UInt256 = config.radiusConfig.getInitialRadius()
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
let proto = PortalProtocol(
|
2021-09-23 12:26:41 +00:00
|
|
|
protocolHandler: messageHandler,
|
|
|
|
protocolId: protocolId,
|
2022-01-18 08:01:22 +00:00
|
|
|
routingTable: RoutingTable.init(
|
|
|
|
baseProtocol.localNode, config.bitsPerHop, config.tableIpLimits,
|
|
|
|
baseProtocol.rng, distanceCalculator),
|
2021-07-09 11:34:16 +00:00
|
|
|
baseProtocol: baseProtocol,
|
2022-01-06 08:06:05 +00:00
|
|
|
contentDB: contentDB,
|
|
|
|
toContentId: toContentId,
|
2022-08-01 19:00:21 +00:00
|
|
|
dbGet: dbGet,
|
2022-05-12 16:04:37 +00:00
|
|
|
radiusConfig: config.radiusConfig,
|
|
|
|
dataRadius: initialRadius,
|
2022-01-19 14:56:14 +00:00
|
|
|
bootstrapRecords: @bootstrapRecords,
|
2022-08-17 07:32:06 +00:00
|
|
|
stream: stream,
|
2022-04-01 16:01:50 +00:00
|
|
|
radiusCache: RadiusCache.init(256),
|
2022-04-11 09:25:36 +00:00
|
|
|
offerQueue: newAsyncQueue[OfferRequest](concurrentOffers))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-10-20 20:31:05 +00:00
|
|
|
proto.baseProtocol.registerTalkProtocol(@(proto.protocolId), proto).expect(
|
2021-07-09 11:34:16 +00:00
|
|
|
"Only one protocol should have this id")
|
|
|
|
|
2022-01-06 08:06:05 +00:00
|
|
|
proto
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-09-13 13:56:44 +00:00
|
|
|
# Sends the discv5 talkreq nessage with provided Portal message, awaits and
|
|
|
|
# validates the proper response, and updates the Portal Network routing table.
|
2021-08-05 14:04:29 +00:00
|
|
|
proc reqResponse[Request: SomeMessage, Response: SomeMessage](
|
2021-09-13 13:56:44 +00:00
|
|
|
p: PortalProtocol,
|
2022-03-17 12:19:36 +00:00
|
|
|
dst: Node,
|
2021-09-13 13:56:44 +00:00
|
|
|
request: Request
|
|
|
|
): Future[PortalResult[Response]] {.async.} =
|
2022-03-17 12:19:36 +00:00
|
|
|
logScope:
|
|
|
|
protocolId = p.protocolId
|
|
|
|
|
|
|
|
trace "Send message request", dstId = dst.id, kind = messageKind(Request)
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_message_requests_outgoing.inc(
|
|
|
|
labelValues = [$p.protocolId, $messageKind(Request)])
|
2022-03-17 12:19:36 +00:00
|
|
|
|
2021-09-23 12:26:41 +00:00
|
|
|
let talkresp =
|
2022-09-10 19:00:27 +00:00
|
|
|
await talkReq(p.baseProtocol, dst, @(p.protocolId), encodeMessage(request))
|
2021-09-13 13:56:44 +00:00
|
|
|
|
2021-09-23 12:26:41 +00:00
|
|
|
# Note: Failure of `decodeMessage` might also simply mean that the peer is
|
|
|
|
# not supporting the specific talk protocol, as according to specification
|
|
|
|
# an empty response needs to be send in that case.
|
|
|
|
# See: https://github.com/ethereum/devp2p/blob/master/discv5/discv5-wire.md#talkreq-request-0x05
|
|
|
|
let messageResponse = talkresp
|
2021-09-13 13:56:44 +00:00
|
|
|
.flatMap(proc (x: seq[byte]): Result[Message, cstring] = decodeMessage(x))
|
|
|
|
.flatMap(proc (m: Message): Result[Response, cstring] =
|
2021-09-23 12:26:41 +00:00
|
|
|
getInnerMessageResult[Response](
|
2021-09-13 13:56:44 +00:00
|
|
|
m, cstring"Invalid message response received")
|
|
|
|
)
|
2021-08-05 14:04:29 +00:00
|
|
|
|
2021-09-23 12:26:41 +00:00
|
|
|
if messageResponse.isOk():
|
2022-03-17 12:19:36 +00:00
|
|
|
trace "Received message response", srcId = dst.id,
|
|
|
|
srcAddress = dst.address, kind = messageKind(Response)
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_message_response_incoming.inc(
|
|
|
|
labelValues = [$p.protocolId, $messageKind(Response)])
|
|
|
|
|
2022-03-17 12:19:36 +00:00
|
|
|
p.routingTable.setJustSeen(dst)
|
2021-09-23 12:26:41 +00:00
|
|
|
else:
|
2021-10-22 09:03:00 +00:00
|
|
|
debug "Error receiving message response", error = messageResponse.error,
|
2022-03-17 12:19:36 +00:00
|
|
|
srcId = dst.id, srcAddress = dst.address
|
|
|
|
p.routingTable.replaceNode(dst)
|
2021-09-23 12:26:41 +00:00
|
|
|
|
|
|
|
return messageResponse
|
|
|
|
|
2022-01-19 14:56:14 +00:00
|
|
|
proc pingImpl*(p: PortalProtocol, dst: Node):
|
2021-07-30 19:19:03 +00:00
|
|
|
Future[PortalResult[PongMessage]] {.async.} =
|
2021-10-13 19:35:54 +00:00
|
|
|
let customPayload = CustomPayload(dataRadius: p.dataRadius)
|
2021-07-09 11:34:16 +00:00
|
|
|
let ping = PingMessage(enrSeq: p.baseProtocol.localNode.record.seqNum,
|
2021-10-13 19:35:54 +00:00
|
|
|
customPayload: ByteList(SSZ.encode(customPayload)))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-09-22 15:07:14 +00:00
|
|
|
return await reqResponse[PingMessage, PongMessage](p, dst, ping)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-03-19 07:54:42 +00:00
|
|
|
proc findNodesImpl*(p: PortalProtocol, dst: Node, distances: List[uint16, 256]):
|
2021-07-30 19:19:03 +00:00
|
|
|
Future[PortalResult[NodesMessage]] {.async.} =
|
2021-12-08 10:54:22 +00:00
|
|
|
let fn = FindNodesMessage(distances: distances)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-08-05 14:04:29 +00:00
|
|
|
# TODO Add nodes validation
|
2021-12-08 10:54:22 +00:00
|
|
|
return await reqResponse[FindNodesMessage, NodesMessage](p, dst, fn)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
proc findContentImpl*(p: PortalProtocol, dst: Node, contentKey: ByteList):
|
2021-10-13 19:35:54 +00:00
|
|
|
Future[PortalResult[ContentMessage]] {.async.} =
|
2021-09-03 08:57:19 +00:00
|
|
|
let fc = FindContentMessage(contentKey: contentKey)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-10-13 19:35:54 +00:00
|
|
|
return await reqResponse[FindContentMessage, ContentMessage](p, dst, fc)
|
2021-07-30 19:19:03 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
proc offerImpl*(p: PortalProtocol, dst: Node, contentKeys: ContentKeysList):
|
2021-09-22 09:28:04 +00:00
|
|
|
Future[PortalResult[AcceptMessage]] {.async.} =
|
|
|
|
let offer = OfferMessage(contentKeys: contentKeys)
|
|
|
|
|
2021-09-22 15:07:14 +00:00
|
|
|
return await reqResponse[OfferMessage, AcceptMessage](p, dst, offer)
|
2021-09-22 09:28:04 +00:00
|
|
|
|
2021-12-20 10:57:55 +00:00
|
|
|
proc recordsFromBytes*(rawRecords: List[ByteList, 32]): PortalResult[seq[Record]] =
|
2021-07-30 19:19:03 +00:00
|
|
|
var records: seq[Record]
|
|
|
|
for r in rawRecords.asSeq():
|
|
|
|
var record: Record
|
|
|
|
if record.fromBytes(r.asSeq()):
|
|
|
|
records.add(record)
|
2021-12-08 08:26:31 +00:00
|
|
|
else:
|
|
|
|
# If any of the ENRs is invalid, fail immediatly. This is similar as what
|
|
|
|
# is done on the discovery v5 layer.
|
|
|
|
return err("Deserialization of an ENR failed")
|
2021-07-30 19:19:03 +00:00
|
|
|
|
2021-12-08 08:26:31 +00:00
|
|
|
ok(records)
|
2021-07-30 19:19:03 +00:00
|
|
|
|
2022-01-19 14:56:14 +00:00
|
|
|
proc ping*(p: PortalProtocol, dst: Node):
|
|
|
|
Future[PortalResult[PongMessage]] {.async.} =
|
|
|
|
let pongResponse = await p.pingImpl(dst)
|
|
|
|
|
2022-09-10 19:00:27 +00:00
|
|
|
if pongResponse.isOk():
|
2022-01-19 14:56:14 +00:00
|
|
|
let pong = pongResponse.get()
|
|
|
|
# TODO: This should become custom per Portal Network
|
|
|
|
let customPayloadDecoded =
|
|
|
|
try: SSZ.decode(pong.customPayload.asSeq(), CustomPayload)
|
|
|
|
except MalformedSszError, SszSizeMismatchError:
|
|
|
|
# invalid custom payload
|
|
|
|
return err("Pong message contains invalid custom payload")
|
|
|
|
|
|
|
|
p.radiusCache.put(dst.id, customPayloadDecoded.dataRadius)
|
|
|
|
|
|
|
|
return pongResponse
|
|
|
|
|
2022-03-19 07:54:42 +00:00
|
|
|
proc findNodes*(
|
|
|
|
p: PortalProtocol, dst: Node, distances: seq[uint16]):
|
|
|
|
Future[PortalResult[seq[Node]]] {.async.} =
|
|
|
|
let nodesMessage = await p.findNodesImpl(dst, List[uint16, 256](distances))
|
|
|
|
if nodesMessage.isOk():
|
|
|
|
let records = recordsFromBytes(nodesMessage.get().enrs)
|
|
|
|
if records.isOk():
|
|
|
|
# TODO: distance function is wrong here for state, fix + tests
|
|
|
|
return ok(verifyNodesRecords(
|
|
|
|
records.get(), dst, enrsResultLimit, distances))
|
|
|
|
else:
|
|
|
|
return err(records.error)
|
|
|
|
else:
|
|
|
|
return err(nodesMessage.error)
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
proc findContent*(p: PortalProtocol, dst: Node, contentKey: ByteList):
|
|
|
|
Future[PortalResult[FoundContent]] {.async.} =
|
2022-07-29 12:24:07 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
let contentMessageResponse = await p.findContentImpl(dst, contentKey)
|
|
|
|
|
|
|
|
if contentMessageResponse.isOk():
|
|
|
|
let m = contentMessageResponse.get()
|
|
|
|
case m.contentMessageType:
|
|
|
|
of connectionIdType:
|
|
|
|
# uTP protocol uses BE for all values in the header, incl. connection id
|
2022-01-25 09:19:16 +00:00
|
|
|
let nodeAddress = NodeAddress.init(dst)
|
|
|
|
if nodeAddress.isNone():
|
|
|
|
# It should not happen as we are already after succesfull talkreq/talkresp
|
|
|
|
# cycle
|
|
|
|
error "Trying to connect to node with unknown address",
|
|
|
|
id = dst.id
|
|
|
|
return err("Trying to connect to node with unknown address")
|
2022-06-24 13:35:31 +00:00
|
|
|
|
2022-05-31 12:28:02 +00:00
|
|
|
let connFuture = p.stream.connectTo(
|
2022-03-30 05:12:39 +00:00
|
|
|
nodeAddress.unsafeGet(),
|
|
|
|
uint16.fromBytesBE(m.connectionId)
|
|
|
|
)
|
|
|
|
|
2022-05-31 12:28:02 +00:00
|
|
|
yield connFuture
|
|
|
|
|
|
|
|
var connectionResult: Result[UtpSocket[NodeAddress], string]
|
|
|
|
|
|
|
|
if connFuture.completed():
|
|
|
|
connectionResult = connFuture.read()
|
|
|
|
else:
|
|
|
|
raise connFuture.error
|
|
|
|
|
2022-03-30 05:12:39 +00:00
|
|
|
if connectionResult.isErr():
|
2022-04-13 05:56:01 +00:00
|
|
|
debug "Utp connection error while trying to find content",
|
2022-04-13 09:17:07 +00:00
|
|
|
error = connectionResult.error
|
2022-03-30 05:12:39 +00:00
|
|
|
return err("Error connecting uTP socket")
|
2022-04-01 16:01:50 +00:00
|
|
|
|
2022-03-30 05:12:39 +00:00
|
|
|
let socket = connectionResult.get()
|
2022-04-20 16:46:00 +00:00
|
|
|
|
2022-05-31 12:28:02 +00:00
|
|
|
try:
|
|
|
|
# Read all bytes from the socket
|
|
|
|
# This will either end with a FIN, or because the read action times out.
|
|
|
|
# A FIN does not necessarily mean that the data read is complete. Further
|
|
|
|
# validation is required, using a length prefix here might be beneficial for
|
|
|
|
# this.
|
|
|
|
let readFut = socket.read()
|
|
|
|
|
|
|
|
readFut.cancelCallback = proc(udate: pointer) {.gcsafe.} =
|
|
|
|
debug "Socket read cancelled",
|
|
|
|
socketKey = socket.socketKey
|
|
|
|
# In case this `findContent` gets cancelled while reading the data,
|
|
|
|
# send a FIN and clean up the socket.
|
|
|
|
socket.close()
|
|
|
|
|
2022-06-24 13:35:31 +00:00
|
|
|
if await readFut.withTimeout(p.stream.contentReadTimeout):
|
2022-05-31 12:28:02 +00:00
|
|
|
let content = readFut.read
|
|
|
|
# socket received remote FIN and drained whole buffer, it can be
|
|
|
|
# safely destroyed without notifing remote
|
|
|
|
debug "Socket read fully",
|
|
|
|
socketKey = socket.socketKey
|
|
|
|
socket.destroy()
|
|
|
|
return ok(FoundContent(src: dst, kind: Content, content: content))
|
|
|
|
else :
|
|
|
|
debug "Socket read time-out",
|
|
|
|
socketKey = socket.socketKey
|
|
|
|
socket.close()
|
|
|
|
return err("Reading data from socket timed out, content request failed")
|
|
|
|
except CancelledError as exc:
|
|
|
|
# even though we already installed cancelCallback on readFut, it is worth
|
2022-06-24 13:35:31 +00:00
|
|
|
# catching CancelledError in case that withTimeout throws CancelledError
|
2022-05-31 12:28:02 +00:00
|
|
|
# but readFut have already finished.
|
|
|
|
debug "Socket read cancelled",
|
|
|
|
socketKey = socket.socketKey
|
2022-06-24 13:35:31 +00:00
|
|
|
|
2022-01-20 14:04:23 +00:00
|
|
|
socket.close()
|
2022-05-31 12:28:02 +00:00
|
|
|
raise exc
|
2022-01-14 15:07:14 +00:00
|
|
|
of contentType:
|
2022-04-06 11:47:23 +00:00
|
|
|
return ok(FoundContent(src: dst, kind: Content, content: m.content.asSeq()))
|
2022-01-14 15:07:14 +00:00
|
|
|
of enrsType:
|
|
|
|
let records = recordsFromBytes(m.enrs)
|
|
|
|
if records.isOk():
|
|
|
|
let verifiedNodes =
|
|
|
|
verifyNodesRecords(records.get(), dst, enrsResultLimit)
|
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
return ok(FoundContent(src: dst, kind: Nodes, nodes: verifiedNodes))
|
2022-01-14 15:07:14 +00:00
|
|
|
else:
|
|
|
|
return err("Content message returned invalid ENRs")
|
2022-07-29 12:24:07 +00:00
|
|
|
else:
|
|
|
|
warn "FindContent failed due to find content request failure ", error = contentMessageResponse.error, contentKey = contentKey
|
|
|
|
|
|
|
|
return err("No content response")
|
2022-01-14 15:07:14 +00:00
|
|
|
|
2022-04-11 17:42:38 +00:00
|
|
|
proc getContentKeys(o: OfferRequest): ContentKeysList =
|
2022-04-11 09:25:36 +00:00
|
|
|
case o.kind
|
|
|
|
of Direct:
|
|
|
|
var contentKeys:ContentKeysList
|
|
|
|
for info in o.contentList:
|
|
|
|
discard contentKeys.add(info.contentKey)
|
|
|
|
return contentKeys
|
|
|
|
of Database:
|
|
|
|
return o.contentKeys
|
|
|
|
|
2022-08-09 12:32:41 +00:00
|
|
|
func getMaxOfferedContentKeys*(protocolIdLen: uint32, maxKeySize: uint32): int =
|
|
|
|
## Calculates how many ContentKeys will fit in one offer message which
|
|
|
|
## will be small enouch to fit into discv5 limit.
|
|
|
|
## This is neccesarry as contentKeysLimit (64) is sometimes to big, and even
|
|
|
|
## half of this can be too much to fit into discv5 limits.
|
|
|
|
|
|
|
|
let maxTalkReqPayload = maxDiscv5PacketSize - getTalkReqOverhead(int(protocolIdLen))
|
|
|
|
# To calculate how much bytes, `n` content keys of size `maxKeySize` will take
|
|
|
|
# we can use following equation:
|
|
|
|
# bytes = (n * (maxKeySize + perContentKeyOverhead)) + offerMessageOverhead
|
|
|
|
# to calculate maximal number of keys which will will given space this can be
|
|
|
|
# transformed to:
|
|
|
|
# n = trunc((bytes - offerMessageOverhead) / (maxKeySize + perContentKeyOverhead))
|
|
|
|
return (
|
|
|
|
(maxTalkReqPayload - 5) div (int(maxKeySize) + 4)
|
|
|
|
)
|
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
proc offer(p: PortalProtocol, o: OfferRequest):
|
|
|
|
Future[PortalResult[void]] {.async.} =
|
|
|
|
## Offer triggers offer-accept interaction with one peer
|
|
|
|
## Whole flow has two phases:
|
|
|
|
## 1. Come to an agreement on what content to transfer, by using offer and accept
|
|
|
|
## messages.
|
|
|
|
## 2. Open uTP stream from content provider to content receiver and transfer
|
|
|
|
## agreed content.
|
|
|
|
## There are two types of possible offer requests:
|
|
|
|
## Direct - when caller provides content to transfer. This way, content is
|
|
|
|
## guaranteed to be transferred as it stays in memory until whole transfer
|
|
|
|
## is completed.
|
|
|
|
## Database - when caller provides keys of content to be transferred. This
|
|
|
|
## way content is provided from database just before it is transferred through
|
|
|
|
## uTP socket. This is useful when there is a lot of content to be transferred
|
|
|
|
## to many peers, and keeping it all in memory could exhaust node resources.
|
|
|
|
## Main drawback is that content may be deleted from the node database
|
|
|
|
## by the cleanup process before it will be transferred, so this way does not
|
2022-04-11 17:42:38 +00:00
|
|
|
## guarantee content transfer.
|
2022-04-11 09:25:36 +00:00
|
|
|
let contentKeys = getContentKeys(o)
|
2022-07-29 12:24:07 +00:00
|
|
|
|
|
|
|
debug "Offering content", contentKeys = contentKeys
|
|
|
|
|
2022-04-12 08:59:41 +00:00
|
|
|
portal_content_keys_offered.observe(contentKeys.len().int64)
|
2022-04-11 09:25:36 +00:00
|
|
|
|
|
|
|
let acceptMessageResponse = await p.offerImpl(o.dst, contentKeys)
|
2022-01-14 15:07:14 +00:00
|
|
|
|
|
|
|
if acceptMessageResponse.isOk():
|
|
|
|
let m = acceptMessageResponse.get()
|
2022-04-13 15:42:32 +00:00
|
|
|
|
|
|
|
let contentKeysLen =
|
|
|
|
case o.kind
|
|
|
|
of Direct:
|
|
|
|
o.contentList.len()
|
|
|
|
of Database:
|
|
|
|
o.contentKeys.len()
|
|
|
|
|
|
|
|
if m.contentKeys.len() != contentKeysLen:
|
|
|
|
# TODO:
|
|
|
|
# When there is such system, the peer should get scored negatively here.
|
|
|
|
error "Accepted content key bitlist has invalid size"
|
|
|
|
return err("Accepted content key bitlist has invalid size")
|
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
let acceptedKeysAmount = m.contentKeys.countOnes()
|
|
|
|
portal_content_keys_accepted.observe(acceptedKeysAmount.int64)
|
|
|
|
if acceptedKeysAmount == 0:
|
2022-07-29 12:24:07 +00:00
|
|
|
debug "No content acceppted", contentKeys = contentKeys
|
2022-03-18 17:29:06 +00:00
|
|
|
# Don't open an uTP stream if no content was requested
|
|
|
|
return ok()
|
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
let nodeAddress = NodeAddress.init(o.dst)
|
2022-01-25 09:19:16 +00:00
|
|
|
if nodeAddress.isNone():
|
|
|
|
# It should not happen as we are already after succesfull talkreq/talkresp
|
|
|
|
# cycle
|
|
|
|
error "Trying to connect to node with unknown address",
|
2022-04-11 09:25:36 +00:00
|
|
|
id = o.dst.id
|
2022-01-25 09:19:16 +00:00
|
|
|
return err("Trying to connect to node with unknown address")
|
2022-04-01 16:01:50 +00:00
|
|
|
|
|
|
|
let connectionResult =
|
2022-03-30 05:12:39 +00:00
|
|
|
await p.stream.connectTo(
|
2022-04-01 16:01:50 +00:00
|
|
|
nodeAddress.unsafeGet(),
|
2022-03-30 05:12:39 +00:00
|
|
|
uint16.fromBytesBE(m.connectionId)
|
|
|
|
)
|
|
|
|
|
|
|
|
if connectionResult.isErr():
|
2022-04-13 05:56:01 +00:00
|
|
|
debug "Utp connection error while trying to offer content",
|
2022-07-29 12:24:07 +00:00
|
|
|
error = connectionResult.error, contentKeys = contentKeys
|
2022-03-30 05:12:39 +00:00
|
|
|
return err("Error connecting uTP socket")
|
|
|
|
|
2022-06-24 13:35:31 +00:00
|
|
|
let socket = connectionResult.get()
|
|
|
|
|
|
|
|
template lenu32(x: untyped): untyped =
|
|
|
|
uint32(len(x))
|
2022-04-01 16:01:50 +00:00
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
case o.kind
|
|
|
|
of Direct:
|
|
|
|
for i, b in m.contentKeys:
|
|
|
|
if b:
|
2022-06-24 13:35:31 +00:00
|
|
|
let content = o.contentList[i].content
|
|
|
|
var output = memoryOutput()
|
|
|
|
|
|
|
|
output.write(toBytes(content.lenu32, Leb128).toOpenArray())
|
|
|
|
output.write(content)
|
|
|
|
|
|
|
|
let dataWritten = await socket.write(output.getOutput)
|
2022-01-14 15:07:14 +00:00
|
|
|
if dataWritten.isErr:
|
2022-07-29 12:24:07 +00:00
|
|
|
debug "Error writing requested data", error = dataWritten.error, contentKeys = contentKeys
|
2022-01-14 15:07:14 +00:00
|
|
|
# No point in trying to continue writing data
|
2022-06-24 13:35:31 +00:00
|
|
|
socket.close()
|
2022-01-14 15:07:14 +00:00
|
|
|
return err("Error writing requested data")
|
2022-04-11 09:25:36 +00:00
|
|
|
of Database:
|
|
|
|
for i, b in m.contentKeys:
|
|
|
|
if b:
|
|
|
|
let contentIdOpt = p.toContentId(o.contentKeys[i])
|
|
|
|
if contentIdOpt.isSome():
|
|
|
|
let
|
|
|
|
contentId = contentIdOpt.get()
|
|
|
|
maybeContent = p.contentDB.get(contentId)
|
2022-06-24 13:35:31 +00:00
|
|
|
|
|
|
|
var output = memoryOutput()
|
2022-04-11 09:25:36 +00:00
|
|
|
if maybeContent.isSome():
|
|
|
|
let content = maybeContent.get()
|
2022-06-24 13:35:31 +00:00
|
|
|
|
|
|
|
output.write(toBytes(content.lenu32, Leb128).toOpenArray())
|
|
|
|
output.write(content)
|
|
|
|
else:
|
|
|
|
# When data turns out missing, add a 0 size varint
|
|
|
|
output.write(toBytes(0'u8, Leb128).toOpenArray())
|
|
|
|
|
|
|
|
let dataWritten = await socket.write(output.getOutput)
|
|
|
|
if dataWritten.isErr:
|
2022-07-29 12:24:07 +00:00
|
|
|
debug "Error writing requested data", error = dataWritten.error, contentKeys = contentKeys
|
2022-06-24 13:35:31 +00:00
|
|
|
# No point in trying to continue writing data
|
|
|
|
socket.close()
|
|
|
|
return err("Error writing requested data")
|
|
|
|
|
2022-07-29 12:24:07 +00:00
|
|
|
debug "Content successfully offered", contentKeys = contentKeys
|
|
|
|
|
2022-06-24 13:35:31 +00:00
|
|
|
await socket.closeWait()
|
2022-01-14 15:07:14 +00:00
|
|
|
return ok()
|
|
|
|
else:
|
2022-07-29 12:24:07 +00:00
|
|
|
warn "Offer failed due to accept request failure ", error = acceptMessageResponse.error, contentKeys = contentKeys
|
2022-01-14 15:07:14 +00:00
|
|
|
return err("No accept response")
|
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
proc offer*(p: PortalProtocol, dst: Node, contentKeys: ContentKeysList):
|
|
|
|
Future[PortalResult[void]] {.async.} =
|
|
|
|
let req = OfferRequest(dst: dst, kind: Database, contentKeys: contentKeys)
|
|
|
|
let res = await p.offer(req)
|
|
|
|
return res
|
|
|
|
|
|
|
|
proc offer*(p: PortalProtocol, dst: Node, content: seq[ContentInfo]):
|
|
|
|
Future[PortalResult[void]] {.async.} =
|
|
|
|
if len(content) > contentKeysLimit:
|
|
|
|
return err("Cannot offer more than 64 content items")
|
2022-04-11 17:42:38 +00:00
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
let contentList = List[ContentInfo, contentKeysLimit].init(content)
|
|
|
|
let req = OfferRequest(dst: dst, kind: Direct, contentList: contentList)
|
|
|
|
let res = await p.offer(req)
|
|
|
|
return res
|
|
|
|
|
2022-04-01 16:01:50 +00:00
|
|
|
proc offerWorker(p: PortalProtocol) {.async.} =
|
|
|
|
while true:
|
2022-04-11 09:25:36 +00:00
|
|
|
let req = await p.offerQueue.popFirst()
|
2022-04-01 16:01:50 +00:00
|
|
|
|
2022-04-11 09:25:36 +00:00
|
|
|
let res = await p.offer(req)
|
2022-04-01 16:01:50 +00:00
|
|
|
if res.isOk():
|
|
|
|
portal_gossip_offers_successful.inc(labelValues = [$p.protocolId])
|
|
|
|
else:
|
|
|
|
portal_gossip_offers_failed.inc(labelValues = [$p.protocolId])
|
|
|
|
|
|
|
|
proc offerQueueEmpty*(p: PortalProtocol): bool =
|
|
|
|
p.offerQueue.empty()
|
|
|
|
|
2021-12-08 08:26:31 +00:00
|
|
|
proc lookupWorker(
|
|
|
|
p: PortalProtocol, dst: Node, target: NodeId): Future[seq[Node]] {.async.} =
|
|
|
|
let distances = lookupDistances(target, dst.id)
|
2022-03-19 07:54:42 +00:00
|
|
|
let nodesMessage = await p.findNodes(dst, distances)
|
2021-12-08 08:26:31 +00:00
|
|
|
if nodesMessage.isOk():
|
|
|
|
let nodes = nodesMessage.get()
|
2021-07-30 19:19:03 +00:00
|
|
|
# Attempt to add all nodes discovered
|
|
|
|
for n in nodes:
|
|
|
|
discard p.routingTable.addNode(n)
|
|
|
|
|
2021-12-08 08:26:31 +00:00
|
|
|
return nodes
|
|
|
|
else:
|
|
|
|
return @[]
|
2021-07-30 19:19:03 +00:00
|
|
|
|
|
|
|
proc lookup*(p: PortalProtocol, target: NodeId): Future[seq[Node]] {.async.} =
|
|
|
|
## Perform a lookup for the given target, return the closest n nodes to the
|
|
|
|
## target. Maximum value for n is `BUCKET_SIZE`.
|
|
|
|
# `closestNodes` holds the k closest nodes to target found, sorted by distance
|
|
|
|
# Unvalidated nodes are used for requests as a form of validation.
|
|
|
|
var closestNodes = p.routingTable.neighbours(target, BUCKET_SIZE,
|
|
|
|
seenOnly = false)
|
|
|
|
|
|
|
|
var asked, seen = initHashSet[NodeId]()
|
|
|
|
asked.incl(p.baseProtocol.localNode.id) # No need to ask our own node
|
|
|
|
seen.incl(p.baseProtocol.localNode.id) # No need to discover our own node
|
|
|
|
for node in closestNodes:
|
|
|
|
seen.incl(node.id)
|
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
var pendingQueries = newSeqOfCap[Future[seq[Node]]](alpha)
|
2022-03-23 15:32:59 +00:00
|
|
|
var requestAmount = 0'i64
|
2021-07-30 19:19:03 +00:00
|
|
|
|
|
|
|
while true:
|
|
|
|
var i = 0
|
|
|
|
# Doing `alpha` amount of requests at once as long as closer non queried
|
|
|
|
# nodes are discovered.
|
2021-12-08 10:54:22 +00:00
|
|
|
while i < closestNodes.len and pendingQueries.len < alpha:
|
2021-07-30 19:19:03 +00:00
|
|
|
let n = closestNodes[i]
|
|
|
|
if not asked.containsOrIncl(n.id):
|
|
|
|
pendingQueries.add(p.lookupWorker(n, target))
|
2022-03-23 15:32:59 +00:00
|
|
|
requestAmount.inc()
|
2021-07-30 19:19:03 +00:00
|
|
|
inc i
|
|
|
|
|
|
|
|
trace "Pending lookup queries", total = pendingQueries.len
|
|
|
|
|
|
|
|
if pendingQueries.len == 0:
|
|
|
|
break
|
|
|
|
|
|
|
|
let query = await one(pendingQueries)
|
|
|
|
trace "Got lookup query response"
|
|
|
|
|
|
|
|
let index = pendingQueries.find(query)
|
|
|
|
if index != -1:
|
|
|
|
pendingQueries.del(index)
|
|
|
|
else:
|
|
|
|
error "Resulting query should have been in the pending queries"
|
|
|
|
|
|
|
|
let nodes = query.read
|
|
|
|
# TODO: Remove node on timed-out query?
|
|
|
|
for n in nodes:
|
|
|
|
if not seen.containsOrIncl(n.id):
|
|
|
|
# If it wasn't seen before, insert node while remaining sorted
|
|
|
|
closestNodes.insert(n, closestNodes.lowerBound(n,
|
|
|
|
proc(x: Node, n: Node): int =
|
2021-10-09 11:22:03 +00:00
|
|
|
cmp(p.routingTable.distance(x.id, target),
|
|
|
|
p.routingTable.distance(n.id, target))
|
2021-07-30 19:19:03 +00:00
|
|
|
))
|
|
|
|
|
|
|
|
if closestNodes.len > BUCKET_SIZE:
|
|
|
|
closestNodes.del(closestNodes.high())
|
|
|
|
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_lookup_node_requests.observe(requestAmount)
|
2021-07-30 19:19:03 +00:00
|
|
|
p.lastLookup = now(chronos.Moment)
|
|
|
|
return closestNodes
|
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
proc triggerPoke*(
|
|
|
|
p: PortalProtocol,
|
2022-04-11 17:42:38 +00:00
|
|
|
nodes: seq[Node],
|
2022-04-06 11:47:23 +00:00
|
|
|
contentKey: ByteList,
|
2022-04-11 09:25:36 +00:00
|
|
|
content: seq[byte]) =
|
2022-04-06 11:47:23 +00:00
|
|
|
## Triggers asynchronous offer-accept interaction to provided nodes.
|
2022-04-13 05:56:01 +00:00
|
|
|
## Provided content should be in range of provided nodes.
|
2022-04-06 11:47:23 +00:00
|
|
|
for node in nodes:
|
|
|
|
if not p.offerQueue.full():
|
|
|
|
try:
|
2022-04-13 05:56:01 +00:00
|
|
|
let
|
|
|
|
ci = ContentInfo(contentKey: contentKey, content: content)
|
|
|
|
list = List[ContentInfo, contentKeysLimit].init(@[ci])
|
|
|
|
req = OfferRequest(dst: node, kind: Direct, contentList: list)
|
2022-04-11 09:25:36 +00:00
|
|
|
p.offerQueue.putNoWait(req)
|
2022-04-06 11:47:23 +00:00
|
|
|
except AsyncQueueFullError as e:
|
2022-04-13 05:56:01 +00:00
|
|
|
# Should not occur as full() check is done.
|
2022-04-06 11:47:23 +00:00
|
|
|
raiseAssert(e.msg)
|
|
|
|
else:
|
2022-04-13 05:56:01 +00:00
|
|
|
# Offer queue is full, do not start more offer-accept interactions
|
2022-04-11 17:42:38 +00:00
|
|
|
return
|
2022-04-06 11:47:23 +00:00
|
|
|
|
2021-09-02 12:35:25 +00:00
|
|
|
# TODO ContentLookup and Lookup look almost exactly the same, also lookups in other
|
|
|
|
# networks will probably be very similar. Extract lookup function to separate module
|
|
|
|
# and make it more generaic
|
2021-09-13 13:56:44 +00:00
|
|
|
proc contentLookup*(p: PortalProtocol, target: ByteList, targetId: UInt256):
|
2022-04-06 11:47:23 +00:00
|
|
|
Future[Option[ContentLookupResult]] {.async.} =
|
2021-09-02 12:35:25 +00:00
|
|
|
## Perform a lookup for the given target, return the closest n nodes to the
|
|
|
|
## target. Maximum value for n is `BUCKET_SIZE`.
|
|
|
|
# `closestNodes` holds the k closest nodes to target found, sorted by distance
|
|
|
|
# Unvalidated nodes are used for requests as a form of validation.
|
2022-07-05 12:42:55 +00:00
|
|
|
var closestNodes = p.routingTable.neighbours(
|
|
|
|
targetId, BUCKET_SIZE, seenOnly = false)
|
|
|
|
# Shuffling the order of the nodes in order to not always hit the same node
|
|
|
|
# first for the same request.
|
|
|
|
p.baseProtocol.rng[].shuffle(closestNodes)
|
2021-09-02 12:35:25 +00:00
|
|
|
|
|
|
|
var asked, seen = initHashSet[NodeId]()
|
|
|
|
asked.incl(p.baseProtocol.localNode.id) # No need to ask our own node
|
|
|
|
seen.incl(p.baseProtocol.localNode.id) # No need to discover our own node
|
|
|
|
for node in closestNodes:
|
|
|
|
seen.incl(node.id)
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
var pendingQueries = newSeqOfCap[Future[PortalResult[FoundContent]]](alpha)
|
2022-03-23 15:32:59 +00:00
|
|
|
var requestAmount = 0'i64
|
2021-09-02 12:35:25 +00:00
|
|
|
|
2022-04-06 11:47:23 +00:00
|
|
|
var nodesWithoutContent: seq[Node] = newSeq[Node]()
|
|
|
|
|
2021-09-02 12:35:25 +00:00
|
|
|
while true:
|
|
|
|
var i = 0
|
|
|
|
# Doing `alpha` amount of requests at once as long as closer non queried
|
|
|
|
# nodes are discovered.
|
2021-12-08 10:54:22 +00:00
|
|
|
while i < closestNodes.len and pendingQueries.len < alpha:
|
2021-09-02 12:35:25 +00:00
|
|
|
let n = closestNodes[i]
|
|
|
|
if not asked.containsOrIncl(n.id):
|
2022-01-14 15:07:14 +00:00
|
|
|
pendingQueries.add(p.findContent(n, target))
|
2022-03-23 15:32:59 +00:00
|
|
|
requestAmount.inc()
|
2021-09-02 12:35:25 +00:00
|
|
|
inc i
|
|
|
|
|
|
|
|
trace "Pending lookup queries", total = pendingQueries.len
|
|
|
|
|
|
|
|
if pendingQueries.len == 0:
|
|
|
|
break
|
|
|
|
|
|
|
|
let query = await one(pendingQueries)
|
|
|
|
trace "Got lookup query response"
|
|
|
|
|
|
|
|
let index = pendingQueries.find(query)
|
|
|
|
if index != -1:
|
|
|
|
pendingQueries.del(index)
|
|
|
|
else:
|
|
|
|
error "Resulting query should have been in the pending queries"
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
let contentResult = query.read
|
|
|
|
|
|
|
|
if contentResult.isOk():
|
|
|
|
let content = contentResult.get()
|
|
|
|
|
|
|
|
case content.kind
|
|
|
|
of Nodes:
|
2022-04-06 11:47:23 +00:00
|
|
|
let maybeRadius = p.radiusCache.get(content.src.id)
|
2022-04-13 05:56:01 +00:00
|
|
|
if maybeRadius.isSome() and
|
|
|
|
p.inRange(content.src.id, maybeRadius.unsafeGet(), targetId):
|
2022-04-06 11:47:23 +00:00
|
|
|
# Only return nodes which may be interested in content.
|
|
|
|
# No need to check for duplicates in nodesWithoutContent
|
|
|
|
# as requests are never made two times to the same node.
|
|
|
|
nodesWithoutContent.add(content.src)
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
for n in content.nodes:
|
|
|
|
if not seen.containsOrIncl(n.id):
|
|
|
|
discard p.routingTable.addNode(n)
|
|
|
|
# If it wasn't seen before, insert node while remaining sorted
|
|
|
|
closestNodes.insert(n, closestNodes.lowerBound(n,
|
|
|
|
proc(x: Node, n: Node): int =
|
|
|
|
cmp(p.routingTable.distance(x.id, targetId),
|
|
|
|
p.routingTable.distance(n.id, targetId))
|
|
|
|
))
|
|
|
|
|
|
|
|
if closestNodes.len > BUCKET_SIZE:
|
|
|
|
closestNodes.del(closestNodes.high())
|
2022-04-11 17:42:38 +00:00
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
of Content:
|
2022-04-20 16:46:00 +00:00
|
|
|
# cancel any pending queries as the content has been found
|
2022-01-14 15:07:14 +00:00
|
|
|
for f in pendingQueries:
|
|
|
|
f.cancel()
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_lookup_content_requests.observe(requestAmount)
|
2022-04-06 11:47:23 +00:00
|
|
|
return some(ContentLookupResult.init(content.content, nodesWithoutContent))
|
2022-01-14 15:07:14 +00:00
|
|
|
else:
|
|
|
|
# TODO: Should we do something with the node that failed responding our
|
|
|
|
# query?
|
|
|
|
discard
|
2021-09-03 08:57:19 +00:00
|
|
|
|
2022-03-23 15:32:59 +00:00
|
|
|
portal_lookup_content_failures.inc()
|
2022-04-06 11:47:23 +00:00
|
|
|
return none[ContentLookupResult]()
|
2021-09-02 12:35:25 +00:00
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
proc query*(p: PortalProtocol, target: NodeId, k = BUCKET_SIZE): Future[seq[Node]]
|
|
|
|
{.async.} =
|
|
|
|
## Query k nodes for the given target, returns all nodes found, including the
|
|
|
|
## nodes queried.
|
|
|
|
##
|
|
|
|
## This will take k nodes from the routing table closest to target and
|
|
|
|
## query them for nodes closest to target. If there are less than k nodes in
|
|
|
|
## the routing table, nodes returned by the first queries will be used.
|
|
|
|
var queryBuffer = p.routingTable.neighbours(target, k, seenOnly = false)
|
|
|
|
|
|
|
|
var asked, seen = initHashSet[NodeId]()
|
|
|
|
asked.incl(p.baseProtocol.localNode.id) # No need to ask our own node
|
|
|
|
seen.incl(p.baseProtocol.localNode.id) # No need to discover our own node
|
|
|
|
for node in queryBuffer:
|
|
|
|
seen.incl(node.id)
|
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
var pendingQueries = newSeqOfCap[Future[seq[Node]]](alpha)
|
2021-07-30 19:19:03 +00:00
|
|
|
|
|
|
|
while true:
|
|
|
|
var i = 0
|
2021-12-08 10:54:22 +00:00
|
|
|
while i < min(queryBuffer.len, k) and pendingQueries.len < alpha:
|
2021-07-30 19:19:03 +00:00
|
|
|
let n = queryBuffer[i]
|
|
|
|
if not asked.containsOrIncl(n.id):
|
|
|
|
pendingQueries.add(p.lookupWorker(n, target))
|
|
|
|
inc i
|
|
|
|
|
|
|
|
trace "Pending lookup queries", total = pendingQueries.len
|
|
|
|
|
|
|
|
if pendingQueries.len == 0:
|
|
|
|
break
|
|
|
|
|
|
|
|
let query = await one(pendingQueries)
|
|
|
|
trace "Got lookup query response"
|
|
|
|
|
|
|
|
let index = pendingQueries.find(query)
|
|
|
|
if index != -1:
|
|
|
|
pendingQueries.del(index)
|
|
|
|
else:
|
|
|
|
error "Resulting query should have been in the pending queries"
|
|
|
|
|
|
|
|
let nodes = query.read
|
|
|
|
# TODO: Remove node on timed-out query?
|
|
|
|
for n in nodes:
|
|
|
|
if not seen.containsOrIncl(n.id):
|
|
|
|
queryBuffer.add(n)
|
|
|
|
|
|
|
|
p.lastLookup = now(chronos.Moment)
|
|
|
|
return queryBuffer
|
|
|
|
|
|
|
|
proc queryRandom*(p: PortalProtocol): Future[seq[Node]] =
|
|
|
|
## Perform a query for a random target, return all nodes discovered.
|
|
|
|
p.query(NodeId.random(p.baseProtocol.rng[]))
|
|
|
|
|
2022-07-26 11:14:56 +00:00
|
|
|
proc getNClosestNodesWithRadius*(
|
|
|
|
p: PortalProtocol,
|
|
|
|
targetId: NodeId,
|
|
|
|
n: int,
|
|
|
|
seenOnly: bool = false): seq[(Node, UInt256)] =
|
|
|
|
let closestLocalNodes = p.routingTable.neighbours(
|
|
|
|
targetId, k = n, seenOnly = seenOnly)
|
|
|
|
|
|
|
|
var nodesWithRadiuses: seq[(Node, UInt256)]
|
|
|
|
for node in closestLocalNodes:
|
|
|
|
let radius = p.radiusCache.get(node.id)
|
|
|
|
if radius.isSome():
|
|
|
|
nodesWithRadiuses.add((node, radius.unsafeGet()))
|
|
|
|
return nodesWithRadiuses
|
|
|
|
|
2022-04-12 13:49:19 +00:00
|
|
|
proc neighborhoodGossip*(
|
2022-06-24 13:35:31 +00:00
|
|
|
p: PortalProtocol, contentKeys: ContentKeysList, content: seq[seq[byte]])
|
2022-04-12 13:49:19 +00:00
|
|
|
{.async.} =
|
2022-06-24 13:35:31 +00:00
|
|
|
if content.len() == 0:
|
|
|
|
return
|
|
|
|
|
|
|
|
var contentList = List[ContentInfo, contentKeysLimit].init(@[])
|
|
|
|
for i, contentItem in content:
|
|
|
|
let contentInfo =
|
|
|
|
ContentInfo(contentKey: contentKeys[i], content: contentItem)
|
|
|
|
discard contentList.add(contentInfo)
|
2022-04-12 13:49:19 +00:00
|
|
|
|
2022-06-24 13:35:31 +00:00
|
|
|
# Just taking the first content item as target id.
|
|
|
|
# TODO: come up with something better?
|
|
|
|
let contentIdOpt = p.toContentId(contentList[0].contentKey)
|
2022-04-12 13:49:19 +00:00
|
|
|
if contentIdOpt.isNone():
|
|
|
|
return
|
|
|
|
|
|
|
|
let contentId = contentIdOpt.get()
|
|
|
|
|
2022-05-07 11:50:16 +00:00
|
|
|
# For selecting the closest nodes to whom to gossip the content a mixed
|
|
|
|
# approach is taken:
|
|
|
|
# 1. Select the closest neighbours in the routing table
|
|
|
|
# 2. Check if the radius is known for these these nodes and whether they are
|
|
|
|
# in range of the content to be offered.
|
|
|
|
# 3. If more than n (= 4) nodes are in range, offer these nodes the content
|
|
|
|
# (max nodes set at 8).
|
|
|
|
# 4. If less than n nodes are in range, do a node lookup, and offer the nodes
|
|
|
|
# returned from the lookup the content (max nodes set at 8)
|
|
|
|
#
|
|
|
|
# This should give a bigger rate of success and avoid the data being stopped
|
|
|
|
# in its propagation than when looking only for nodes in the own routing
|
|
|
|
# table, but at the same time avoid unnecessary node lookups.
|
|
|
|
# It might still cause issues in data getting propagated in a wider id range.
|
|
|
|
|
|
|
|
const maxGossipNodes = 8
|
|
|
|
|
|
|
|
let closestLocalNodes = p.routingTable.neighbours(
|
|
|
|
NodeId(contentId), k = 16, seenOnly = true)
|
|
|
|
|
|
|
|
var gossipNodes: seq[Node]
|
|
|
|
for node in closestLocalNodes:
|
|
|
|
let radius = p.radiusCache.get(node.id)
|
|
|
|
if radius.isSome():
|
|
|
|
if p.inRange(node.id, radius.unsafeGet(), contentId):
|
|
|
|
gossipNodes.add(node)
|
|
|
|
|
|
|
|
if gossipNodes.len >= 8: # use local nodes for gossip
|
|
|
|
portal_gossip_without_lookup.inc(labelValues = [$p.protocolId])
|
|
|
|
for node in gossipNodes[0..<min(gossipNodes.len, maxGossipNodes)]:
|
|
|
|
let req = OfferRequest(dst: node, kind: Direct, contentList: contentList)
|
|
|
|
await p.offerQueue.addLast(req)
|
|
|
|
else: # use looked up nodes for gossip
|
|
|
|
portal_gossip_with_lookup.inc(labelValues = [$p.protocolId])
|
|
|
|
let closestNodes = await p.lookup(NodeId(contentId))
|
|
|
|
for node in closestNodes[0..<min(closestNodes.len, maxGossipNodes)]:
|
|
|
|
# Note: opportunistically not checking if the radius of the node is known
|
|
|
|
# and thus if the node is in radius with the content. Reason is, these
|
|
|
|
# should really be the closest nodes in the DHT, and thus are most likely
|
|
|
|
# going to be in range of the requested content.
|
|
|
|
let req = OfferRequest(dst: node, kind: Direct, contentList: contentList)
|
|
|
|
await p.offerQueue.addLast(req)
|
2022-04-12 13:49:19 +00:00
|
|
|
|
2022-05-12 16:04:37 +00:00
|
|
|
proc adjustRadius(
|
2022-05-24 11:27:22 +00:00
|
|
|
p: PortalProtocol,
|
|
|
|
fractionOfDeletedContent: float64,
|
|
|
|
furthestElementInDbDistance: UInt256) =
|
2022-05-12 16:04:37 +00:00
|
|
|
|
|
|
|
if fractionOfDeletedContent == 0.0:
|
|
|
|
# even though pruning was triggered no content was deleted, it could happen
|
|
|
|
# in pathological case of really small database with really big values.
|
|
|
|
# log it as error as it should not happenn
|
|
|
|
error "Database pruning attempt resulted in no content deleted"
|
|
|
|
return
|
|
|
|
|
|
|
|
# we need to invert fraction as our Uin256 implementation does not support
|
|
|
|
# multiplication by float
|
|
|
|
let invertedFractionAsInt = int64(1.0 / fractionOfDeletedContent)
|
|
|
|
|
2022-05-24 11:27:22 +00:00
|
|
|
let scaledRadius = p.dataRadius div u256(invertedFractionAsInt)
|
2022-05-12 16:04:37 +00:00
|
|
|
|
|
|
|
# Chose larger value to avoid situation, where furthestElementInDbDistance
|
|
|
|
# is super close to local id, so local radius would end up too small
|
|
|
|
# to accept any more data to local database
|
|
|
|
# If scaledRadius radius will be larger it will still contain all elements
|
|
|
|
let newRadius = max(scaledRadius, furthestElementInDbDistance)
|
|
|
|
|
|
|
|
debug "Database pruned",
|
|
|
|
oldRadius = p.dataRadius,
|
|
|
|
newRadius = newRadius,
|
|
|
|
furthestDistanceInDb = furthestElementInDbDistance,
|
|
|
|
fractionOfDeletedContent = fractionOfDeletedContent
|
|
|
|
|
|
|
|
# both scaledRadius and furthestElementInDbDistance are smaller than current
|
|
|
|
# dataRadius, so the radius will constantly decrease through the node
|
|
|
|
# life time
|
|
|
|
p.dataRadius = newRadius
|
|
|
|
|
|
|
|
proc storeContent*(p: PortalProtocol, key: ContentId, content: openArray[byte]) =
|
|
|
|
# always re-check that key is in node range, to make sure that invariant that
|
|
|
|
# all keys in database are always in node range hold.
|
|
|
|
# TODO current silent assumption is that both contentDb and portalProtocol are
|
|
|
|
# using the same xor distance function
|
|
|
|
if p.inRange(key):
|
|
|
|
case p.radiusConfig.kind:
|
|
|
|
of Dynamic:
|
|
|
|
# In case of dynamic radius setting we obey storage limits and adjust
|
|
|
|
# radius to store network fraction corresponding to those storage limits.
|
|
|
|
let res = p.contentDB.put(key, content, p.baseProtocol.localNode.id)
|
|
|
|
if res.kind == DbPruned:
|
2022-05-17 10:47:24 +00:00
|
|
|
portal_pruning_counter.inc(labelValues = [$p.protocolId])
|
|
|
|
portal_pruning_deleted_elements.set(
|
|
|
|
res.numOfDeletedElements.int64,
|
|
|
|
labelValues = [$p.protocolId]
|
|
|
|
)
|
|
|
|
|
2022-05-12 16:04:37 +00:00
|
|
|
p.adjustRadius(
|
|
|
|
res.fractionOfDeletedContent,
|
|
|
|
res.furthestStoredElementDistance
|
|
|
|
)
|
|
|
|
of Static:
|
|
|
|
# If the config is set statically, radius is not adjusted, and is kept
|
|
|
|
# constant thorugh node life time, also database max size is disabled
|
|
|
|
# so we will effectivly store fraction of the network
|
|
|
|
p.contentDB.put(key, content)
|
|
|
|
|
2021-09-23 12:26:41 +00:00
|
|
|
proc seedTable*(p: PortalProtocol) =
|
2021-11-16 16:50:08 +00:00
|
|
|
## Seed the table with specifically provided Portal bootstrap nodes. These are
|
|
|
|
## nodes that must support the wire protocol for the specific content network.
|
2021-09-23 12:26:41 +00:00
|
|
|
# Note: We allow replacing the bootstrap nodes in the routing table as it is
|
|
|
|
# possible that some of these are not supporting the specific portal network.
|
2021-11-16 16:50:08 +00:00
|
|
|
# Other note: One could also pick nodes from the discv5 routing table to
|
|
|
|
# bootstrap the portal networks, however it would require a flag in the ENR to
|
|
|
|
# be added and there might be none in the routing table due to low amount of
|
|
|
|
# Portal nodes versus other nodes.
|
2022-03-17 12:19:36 +00:00
|
|
|
logScope:
|
|
|
|
protocolId = p.protocolId
|
2021-09-23 12:26:41 +00:00
|
|
|
|
|
|
|
for record in p.bootstrapRecords:
|
|
|
|
if p.addNode(record):
|
|
|
|
debug "Added bootstrap node", uri = toURI(record),
|
|
|
|
protocolId = p.protocolId
|
|
|
|
else:
|
|
|
|
error "Bootstrap node could not be added", uri = toURI(record),
|
|
|
|
protocolId = p.protocolId
|
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
proc populateTable(p: PortalProtocol) {.async.} =
|
|
|
|
## Do a set of initial lookups to quickly populate the table.
|
|
|
|
# start with a self target query (neighbour nodes)
|
2022-03-17 12:19:36 +00:00
|
|
|
logScope:
|
|
|
|
protocolId = p.protocolId
|
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
let selfQuery = await p.query(p.baseProtocol.localNode.id)
|
|
|
|
trace "Discovered nodes in self target query", nodes = selfQuery.len
|
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
for i in 0..<initialLookups:
|
2021-07-30 19:19:03 +00:00
|
|
|
let randomQuery = await p.queryRandom()
|
|
|
|
trace "Discovered nodes in random target query", nodes = randomQuery.len
|
|
|
|
|
|
|
|
debug "Total nodes in routing table after populate",
|
|
|
|
total = p.routingTable.len()
|
|
|
|
|
|
|
|
proc revalidateNode*(p: PortalProtocol, n: Node) {.async.} =
|
|
|
|
let pong = await p.ping(n)
|
|
|
|
|
2022-09-10 19:00:27 +00:00
|
|
|
if pong.isOk():
|
2021-07-30 19:19:03 +00:00
|
|
|
let res = pong.get()
|
|
|
|
if res.enrSeq > n.record.seqNum:
|
|
|
|
# Request new ENR
|
2022-03-19 07:54:42 +00:00
|
|
|
let nodesMessage = await p.findNodes(n, @[0'u16])
|
2021-12-08 08:26:31 +00:00
|
|
|
if nodesMessage.isOk():
|
|
|
|
let nodes = nodesMessage.get()
|
|
|
|
if nodes.len > 0: # Normally a node should only return 1 record actually
|
|
|
|
discard p.routingTable.addNode(nodes[0])
|
2021-07-30 19:19:03 +00:00
|
|
|
|
|
|
|
proc revalidateLoop(p: PortalProtocol) {.async.} =
|
|
|
|
## Loop which revalidates the nodes in the routing table by sending the ping
|
|
|
|
## message.
|
|
|
|
try:
|
|
|
|
while true:
|
2021-12-08 10:54:22 +00:00
|
|
|
await sleepAsync(milliseconds(p.baseProtocol.rng[].rand(revalidateMax)))
|
2021-07-30 19:19:03 +00:00
|
|
|
let n = p.routingTable.nodeToRevalidate()
|
|
|
|
if not n.isNil:
|
|
|
|
asyncSpawn p.revalidateNode(n)
|
|
|
|
except CancelledError:
|
|
|
|
trace "revalidateLoop canceled"
|
|
|
|
|
|
|
|
proc refreshLoop(p: PortalProtocol) {.async.} =
|
|
|
|
## Loop that refreshes the routing table by starting a random query in case
|
|
|
|
## no queries were done since `refreshInterval` or more.
|
|
|
|
## It also refreshes the majority address voted for via pong responses.
|
2022-03-17 12:19:36 +00:00
|
|
|
logScope:
|
|
|
|
protocolId = p.protocolId
|
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
try:
|
|
|
|
while true:
|
2021-11-16 16:50:08 +00:00
|
|
|
# TODO: It would be nicer and more secure if this was event based and/or
|
|
|
|
# steered from the routing table.
|
|
|
|
while p.routingTable.len() == 0:
|
|
|
|
p.seedTable()
|
|
|
|
await p.populateTable()
|
|
|
|
await sleepAsync(5.seconds)
|
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
let currentTime = now(chronos.Moment)
|
2021-12-08 10:54:22 +00:00
|
|
|
if currentTime > (p.lastLookup + refreshInterval):
|
2021-07-30 19:19:03 +00:00
|
|
|
let randomQuery = await p.queryRandom()
|
|
|
|
trace "Discovered nodes in random target query", nodes = randomQuery.len
|
|
|
|
debug "Total nodes in routing table", total = p.routingTable.len()
|
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
await sleepAsync(refreshInterval)
|
2021-07-30 19:19:03 +00:00
|
|
|
except CancelledError:
|
|
|
|
trace "refreshLoop canceled"
|
|
|
|
|
|
|
|
proc start*(p: PortalProtocol) =
|
|
|
|
p.refreshLoop = refreshLoop(p)
|
|
|
|
p.revalidateLoop = revalidateLoop(p)
|
|
|
|
|
2022-04-01 16:01:50 +00:00
|
|
|
for i in 0 ..< concurrentOffers:
|
|
|
|
p.offerWorkers.add(offerWorker(p))
|
|
|
|
|
2021-07-30 19:19:03 +00:00
|
|
|
proc stop*(p: PortalProtocol) =
|
|
|
|
if not p.revalidateLoop.isNil:
|
|
|
|
p.revalidateLoop.cancel()
|
|
|
|
if not p.refreshLoop.isNil:
|
|
|
|
p.refreshLoop.cancel()
|
2021-12-08 08:26:31 +00:00
|
|
|
|
2022-04-01 16:01:50 +00:00
|
|
|
for worker in p.offerWorkers:
|
|
|
|
worker.cancel()
|
|
|
|
p.offerWorkers = @[]
|
|
|
|
|
2021-12-08 08:26:31 +00:00
|
|
|
proc resolve*(p: PortalProtocol, id: NodeId): Future[Option[Node]] {.async.} =
|
|
|
|
## Resolve a `Node` based on provided `NodeId`.
|
|
|
|
##
|
|
|
|
## This will first look in the own routing table. If the node is known, it
|
|
|
|
## will try to contact if for newer information. If node is not known or it
|
|
|
|
## does not reply, a lookup is done to see if it can find a (newer) record of
|
|
|
|
## the node on the network.
|
|
|
|
if id == p.localNode.id:
|
|
|
|
return some(p.localNode)
|
|
|
|
|
|
|
|
let node = p.routingTable.getNode(id)
|
|
|
|
if node.isSome():
|
2022-03-19 07:54:42 +00:00
|
|
|
let nodesMessage = await p.findNodes(node.get(), @[0'u16])
|
2021-12-08 08:26:31 +00:00
|
|
|
# TODO: Handle failures better. E.g. stop on different failures than timeout
|
|
|
|
if nodesMessage.isOk() and nodesMessage[].len > 0:
|
|
|
|
return some(nodesMessage[][0])
|
|
|
|
|
|
|
|
let discovered = await p.lookup(id)
|
|
|
|
for n in discovered:
|
|
|
|
if n.id == id:
|
|
|
|
if node.isSome() and node.get().record.seqNum >= n.record.seqNum:
|
|
|
|
return node
|
|
|
|
else:
|
|
|
|
return some(n)
|
|
|
|
|
|
|
|
return node
|
2022-07-20 10:46:42 +00:00
|
|
|
|
|
|
|
proc resolveWithRadius*(p: PortalProtocol, id: NodeId): Future[Option[(Node, UInt256)]] {.async.} =
|
|
|
|
## Resolve a `Node` based on provided `NodeId`, also try to establish what
|
|
|
|
## is known radius of found node.
|
|
|
|
##
|
|
|
|
## This will first look in the own routing table. If the node is known, it
|
|
|
|
## will try to contact if for newer information. If node is not known or it
|
|
|
|
## does not reply, a lookup is done to see if it can find a (newer) record of
|
|
|
|
## the node on the network.
|
|
|
|
##
|
|
|
|
## If node is found, radius will be first checked in radius cache, it radius
|
|
|
|
## is not known node will be pinged to establish what is its current radius
|
|
|
|
##
|
|
|
|
|
|
|
|
let n = await p.resolve(id)
|
|
|
|
|
|
|
|
if n.isNone():
|
|
|
|
return none((Node, UInt256))
|
|
|
|
|
|
|
|
let node = n.unsafeGet()
|
|
|
|
|
|
|
|
let r = p.radiusCache.get(id)
|
|
|
|
|
|
|
|
if r.isSome():
|
|
|
|
return some((node, r.unsafeGet()))
|
|
|
|
|
|
|
|
let pongResult = await p.ping(node)
|
|
|
|
|
|
|
|
if pongResult.isOk():
|
|
|
|
let maybeRadius = p.radiusCache.get(id)
|
|
|
|
|
|
|
|
# After successful ping radius should already be in cache, but for the unlikely
|
|
|
|
# case that it is not, check it just to be sure.
|
|
|
|
# TODO: rafactor ping to return node radius.
|
|
|
|
if maybeRadius.isNone():
|
|
|
|
return none((Node, UInt256))
|
|
|
|
|
|
|
|
# If pong is successful, radius of the node should definitly be in local
|
|
|
|
# radius cache
|
|
|
|
return some((node, maybeRadius.unsafeGet()))
|
|
|
|
else:
|
|
|
|
return none((Node, UInt256))
|