2021-07-09 11:34:16 +00:00
|
|
|
# Nimbus - Portal Network
|
2023-11-10 18:38:11 +00:00
|
|
|
# Copyright (c) 2021-2023 Status Research & Development GmbH
|
2021-07-09 11:34:16 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
import
|
|
|
|
std/[options, strutils, tables],
|
|
|
|
confutils, confutils/std/net, chronicles, chronicles/topics_registry,
|
2022-11-08 17:31:45 +00:00
|
|
|
chronos, metrics, metrics/chronos_httpserver, stew/[byteutils, results],
|
2021-09-03 08:57:19 +00:00
|
|
|
nimcrypto/[hash, sha2],
|
2021-07-09 11:34:16 +00:00
|
|
|
eth/[keys, net/nat],
|
|
|
|
eth/p2p/discoveryv5/[enr, node],
|
|
|
|
eth/p2p/discoveryv5/protocol as discv5_protocol,
|
2021-12-13 08:06:29 +00:00
|
|
|
../common/common_utils,
|
2022-01-06 08:06:05 +00:00
|
|
|
../content_db,
|
2022-11-08 17:31:45 +00:00
|
|
|
../network/wire/[portal_protocol, portal_stream, portal_protocol_config],
|
2022-08-23 14:28:10 +00:00
|
|
|
../network/history/[history_content, history_network]
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-09-29 11:58:55 +00:00
|
|
|
const
|
2023-11-10 18:38:11 +00:00
|
|
|
defaultListenAddress* = (static parseIpAddress("0.0.0.0"))
|
|
|
|
defaultAdminListenAddress* = (static parseIpAddress("127.0.0.1"))
|
2021-09-29 11:58:55 +00:00
|
|
|
|
2021-12-08 10:54:22 +00:00
|
|
|
defaultListenAddressDesc = $defaultListenAddress
|
|
|
|
defaultAdminListenAddressDesc = $defaultAdminListenAddress
|
2022-05-09 15:18:57 +00:00
|
|
|
# 100mb seems a bit smallish we may consider increasing defaults after some
|
|
|
|
# network measurements
|
|
|
|
defaultStorageSize* = uint32(1000 * 1000 * 100)
|
2022-07-11 14:29:16 +00:00
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
type
|
|
|
|
PortalCmd* = enum
|
|
|
|
noCommand
|
|
|
|
ping
|
2022-09-10 19:00:27 +00:00
|
|
|
findNodes
|
|
|
|
findContent
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-12-13 08:06:29 +00:00
|
|
|
PortalCliConf* = object
|
2021-07-09 11:34:16 +00:00
|
|
|
logLevel* {.
|
|
|
|
defaultValue: LogLevel.DEBUG
|
2021-09-29 11:58:55 +00:00
|
|
|
defaultValueDesc: $LogLevel.DEBUG
|
2021-07-09 11:34:16 +00:00
|
|
|
desc: "Sets the log level"
|
|
|
|
name: "log-level" .}: LogLevel
|
|
|
|
|
|
|
|
udpPort* {.
|
|
|
|
defaultValue: 9009
|
|
|
|
desc: "UDP listening port"
|
|
|
|
name: "udp-port" .}: uint16
|
|
|
|
|
|
|
|
listenAddress* {.
|
2021-12-08 10:54:22 +00:00
|
|
|
defaultValue: defaultListenAddress
|
|
|
|
defaultValueDesc: $defaultListenAddressDesc
|
2021-07-09 11:34:16 +00:00
|
|
|
desc: "Listening address for the Discovery v5 traffic"
|
2023-11-10 18:38:11 +00:00
|
|
|
name: "listen-address" }: IpAddress
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-12-13 08:06:29 +00:00
|
|
|
# Note: This will add bootstrap nodes for both Discovery v5 network and each
|
|
|
|
# enabled Portal network. No distinction is made on bootstrap nodes per
|
|
|
|
# specific network.
|
|
|
|
bootstrapNodes* {.
|
|
|
|
desc: "ENR URI of node to bootstrap Discovery v5 and the Portal networks from. Argument may be repeated"
|
|
|
|
name: "bootstrap-node" .}: seq[Record]
|
|
|
|
|
|
|
|
bootstrapNodesFile* {.
|
|
|
|
desc: "Specifies a line-delimited file of ENR URIs to bootstrap Discovery v5 and Portal networks from"
|
|
|
|
defaultValue: ""
|
|
|
|
name: "bootstrap-file" }: InputFile
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
nat* {.
|
|
|
|
desc: "Specify method to use for determining public address. " &
|
|
|
|
"Must be one of: any, none, upnp, pmp, extip:<IP>"
|
|
|
|
defaultValue: NatConfig(hasExtIp: false, nat: NatAny)
|
2021-09-29 11:58:55 +00:00
|
|
|
defaultValueDesc: "any"
|
2021-07-09 11:34:16 +00:00
|
|
|
name: "nat" .}: NatConfig
|
|
|
|
|
|
|
|
enrAutoUpdate* {.
|
|
|
|
defaultValue: false
|
|
|
|
desc: "Discovery can automatically update its ENR with the IP address " &
|
|
|
|
"and UDP port as seen by other nodes it communicates with. " &
|
|
|
|
"This option allows to enable/disable this functionality"
|
|
|
|
name: "enr-auto-update" .}: bool
|
|
|
|
|
2021-12-13 13:12:51 +00:00
|
|
|
networkKey* {.
|
|
|
|
desc: "Private key (secp256k1) for the p2p network, hex encoded.",
|
2021-07-09 11:34:16 +00:00
|
|
|
defaultValue: PrivateKey.random(keys.newRng()[])
|
2021-09-29 11:58:55 +00:00
|
|
|
defaultValueDesc: "random"
|
2021-12-13 13:12:51 +00:00
|
|
|
name: "network-key" .}: PrivateKey
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
metricsEnabled* {.
|
|
|
|
defaultValue: false
|
|
|
|
desc: "Enable the metrics server"
|
|
|
|
name: "metrics" .}: bool
|
|
|
|
|
|
|
|
metricsAddress* {.
|
2021-12-08 10:54:22 +00:00
|
|
|
defaultValue: defaultAdminListenAddress
|
|
|
|
defaultValueDesc: $defaultAdminListenAddressDesc
|
2021-07-09 11:34:16 +00:00
|
|
|
desc: "Listening address of the metrics server"
|
2023-11-10 18:38:11 +00:00
|
|
|
name: "metrics-address" .}: IpAddress
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
metricsPort* {.
|
|
|
|
defaultValue: 8008
|
|
|
|
desc: "Listening HTTP port of the metrics server"
|
|
|
|
name: "metrics-port" .}: Port
|
|
|
|
|
2021-12-13 13:12:51 +00:00
|
|
|
protocolId* {.
|
2022-08-23 14:28:10 +00:00
|
|
|
defaultValue: historyProtocolId
|
2021-12-13 13:12:51 +00:00
|
|
|
desc: "Portal wire protocol id for the network to connect to"
|
|
|
|
name: "protocol-id" .}: PortalProtocolId
|
|
|
|
|
2022-05-09 15:18:57 +00:00
|
|
|
# TODO maybe it is worth defining minimal storage size and throw error if
|
|
|
|
# value provided is smaller than minimum
|
|
|
|
storageSize* {.
|
|
|
|
desc: "Maximum amount (in bytes) of content which will be stored " &
|
|
|
|
"in local database."
|
|
|
|
defaultValue: defaultStorageSize
|
|
|
|
name: "storage-size" .}: uint32
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
case cmd* {.
|
|
|
|
command
|
|
|
|
defaultValue: noCommand }: PortalCmd
|
|
|
|
of noCommand:
|
|
|
|
discard
|
|
|
|
of ping:
|
|
|
|
pingTarget* {.
|
|
|
|
argument
|
|
|
|
desc: "ENR URI of the node to a send ping message"
|
|
|
|
name: "node" .}: Node
|
2022-09-10 19:00:27 +00:00
|
|
|
of findNodes:
|
2021-07-09 11:34:16 +00:00
|
|
|
distance* {.
|
|
|
|
defaultValue: 255
|
2021-12-08 10:54:22 +00:00
|
|
|
desc: "Distance parameter for the findNodes message"
|
2021-07-09 11:34:16 +00:00
|
|
|
name: "distance" .}: uint16
|
|
|
|
# TODO: Order here matters as else the help message does not show all the
|
|
|
|
# information, see: https://github.com/status-im/nim-confutils/issues/15
|
2021-12-08 10:54:22 +00:00
|
|
|
findNodesTarget* {.
|
2021-07-09 11:34:16 +00:00
|
|
|
argument
|
2021-12-08 10:54:22 +00:00
|
|
|
desc: "ENR URI of the node to send a findNodes message"
|
2021-07-09 11:34:16 +00:00
|
|
|
name: "node" .}: Node
|
2022-09-10 19:00:27 +00:00
|
|
|
of findContent:
|
2021-07-09 11:34:16 +00:00
|
|
|
findContentTarget* {.
|
|
|
|
argument
|
|
|
|
desc: "ENR URI of the node to send a findContent message"
|
|
|
|
name: "node" .}: Node
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc parseCmdArg*(T: type enr.Record, p: string): T =
|
2021-07-09 11:34:16 +00:00
|
|
|
if not fromURI(result, p):
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, "Invalid ENR")
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc completeCmdArg*(T: type enr.Record, val: string): seq[string] =
|
2021-07-09 11:34:16 +00:00
|
|
|
return @[]
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc parseCmdArg*(T: type Node, p: string): T =
|
2021-07-09 11:34:16 +00:00
|
|
|
var record: enr.Record
|
|
|
|
if not fromURI(record, p):
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, "Invalid ENR")
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
let n = newNode(record)
|
|
|
|
if n.isErr:
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, $n.error)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
if n[].address.isNone():
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, "ENR without address")
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
n[]
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc completeCmdArg*(T: type Node, val: string): seq[string] =
|
2021-07-09 11:34:16 +00:00
|
|
|
return @[]
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc parseCmdArg*(T: type PrivateKey, p: string): T =
|
2021-07-09 11:34:16 +00:00
|
|
|
try:
|
2023-01-31 12:38:08 +00:00
|
|
|
result = PrivateKey.fromHex(p).tryGet()
|
2021-07-09 11:34:16 +00:00
|
|
|
except CatchableError:
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError, "Invalid private key")
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc completeCmdArg*(T: type PrivateKey, val: string): seq[string] =
|
2021-07-09 11:34:16 +00:00
|
|
|
return @[]
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc parseCmdArg*(T: type PortalProtocolId, p: string): T =
|
2021-12-13 13:12:51 +00:00
|
|
|
try:
|
2023-01-31 12:38:08 +00:00
|
|
|
result = byteutils.hexToByteArray(p, 2)
|
2021-12-13 13:12:51 +00:00
|
|
|
except ValueError:
|
2023-08-04 12:43:30 +00:00
|
|
|
raise newException(ValueError,
|
2021-12-13 13:12:51 +00:00
|
|
|
"Invalid protocol id, not a valid hex value")
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
proc completeCmdArg*(T: type PortalProtocolId, val: string): seq[string] =
|
2021-12-13 13:12:51 +00:00
|
|
|
return @[]
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
proc discover(d: discv5_protocol.Protocol) {.async.} =
|
|
|
|
while true:
|
|
|
|
let discovered = await d.queryRandom()
|
|
|
|
info "Lookup finished", nodes = discovered.len
|
|
|
|
await sleepAsync(30.seconds)
|
|
|
|
|
2022-11-08 17:31:45 +00:00
|
|
|
proc testContentIdHandler(contentKey: ByteList): results.Opt[ContentId] =
|
2022-01-06 08:06:05 +00:00
|
|
|
# Note: Returning a static content id here, as in practice this depends
|
|
|
|
# on the content key to content id derivation, which is different for the
|
|
|
|
# different content networks. And we want these tests to be independent from
|
|
|
|
# that.
|
|
|
|
let idHash = sha256.digest("test")
|
2022-11-08 17:31:45 +00:00
|
|
|
ok(readUintBE[256](idHash.data))
|
2021-09-03 08:57:19 +00:00
|
|
|
|
2021-12-13 08:06:29 +00:00
|
|
|
proc run(config: PortalCliConf) =
|
2021-07-09 11:34:16 +00:00
|
|
|
let
|
|
|
|
rng = newRng()
|
|
|
|
bindIp = config.listenAddress
|
|
|
|
udpPort = Port(config.udpPort)
|
|
|
|
# TODO: allow for no TCP port mapping!
|
|
|
|
(extIp, _, extUdpPort) = setupAddress(config.nat,
|
2021-12-13 13:12:51 +00:00
|
|
|
config.listenAddress, udpPort, udpPort, "portalcli")
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-12-13 08:06:29 +00:00
|
|
|
var bootstrapRecords: seq[Record]
|
|
|
|
loadBootstrapFile(string config.bootstrapNodesFile, bootstrapRecords)
|
|
|
|
bootstrapRecords.add(config.bootstrapNodes)
|
|
|
|
|
|
|
|
let d = newProtocol(
|
2021-12-13 13:12:51 +00:00
|
|
|
config.networkKey,
|
2021-12-13 08:06:29 +00:00
|
|
|
extIp, none(Port), extUdpPort,
|
|
|
|
bootstrapRecords = bootstrapRecords,
|
|
|
|
bindIp = bindIp, bindPort = udpPort,
|
|
|
|
enrAutoUpdate = config.enrAutoUpdate,
|
|
|
|
rng = rng)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
d.open()
|
|
|
|
|
2022-01-14 15:07:14 +00:00
|
|
|
let
|
2022-05-09 15:18:57 +00:00
|
|
|
db = ContentDB.new("", config.storageSize, inMemory = true)
|
2022-08-17 07:32:06 +00:00
|
|
|
sm = StreamManager.new(d)
|
2023-09-04 10:21:01 +00:00
|
|
|
cq = newAsyncQueue[(Opt[NodeId], ContentKeysList, seq[seq[byte]])](50)
|
2022-08-17 07:32:06 +00:00
|
|
|
stream = sm.registerNewStream(cq)
|
2022-11-08 17:31:45 +00:00
|
|
|
portal = PortalProtocol.new(d, config.protocolId,
|
|
|
|
testContentIdHandler, createGetHandler(db), stream,
|
2022-02-11 13:43:10 +00:00
|
|
|
bootstrapRecords = bootstrapRecords)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2022-11-08 17:31:45 +00:00
|
|
|
portal.dbPut = createStoreHandler(db, defaultRadiusConfig, portal)
|
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
if config.metricsEnabled:
|
|
|
|
let
|
|
|
|
address = config.metricsAddress
|
|
|
|
port = config.metricsPort
|
|
|
|
notice "Starting metrics HTTP server",
|
|
|
|
url = "http://" & $address & ":" & $port & "/metrics"
|
|
|
|
try:
|
|
|
|
chronos_httpserver.startMetricsHttpServer($address, port)
|
|
|
|
except CatchableError as exc: raise exc
|
|
|
|
except Exception as exc: raiseAssert exc.msg # TODO fix metrics
|
|
|
|
|
|
|
|
case config.cmd
|
|
|
|
of ping:
|
|
|
|
let pong = waitFor portal.ping(config.pingTarget)
|
|
|
|
|
|
|
|
if pong.isOk():
|
|
|
|
echo pong.get()
|
|
|
|
else:
|
|
|
|
echo pong.error
|
2022-09-10 19:00:27 +00:00
|
|
|
of findNodes:
|
2022-03-19 07:54:42 +00:00
|
|
|
let distances = @[config.distance]
|
2021-12-08 10:54:22 +00:00
|
|
|
let nodes = waitFor portal.findNodes(config.findNodesTarget, distances)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
if nodes.isOk():
|
2022-03-19 07:54:42 +00:00
|
|
|
for node in nodes.get():
|
|
|
|
echo $node.record & " - " & shortLog(node)
|
2021-07-09 11:34:16 +00:00
|
|
|
else:
|
|
|
|
echo nodes.error
|
2022-09-10 19:00:27 +00:00
|
|
|
of findContent:
|
2022-07-04 07:38:02 +00:00
|
|
|
proc random(T: type UInt256, rng: var HmacDrbgContext): T =
|
|
|
|
rng.generate(T)
|
2021-07-09 11:34:16 +00:00
|
|
|
|
2021-09-03 08:57:19 +00:00
|
|
|
# For now just some random bytes
|
2021-10-22 15:49:23 +00:00
|
|
|
let contentKey = ByteList.init(@[1'u8])
|
2021-09-03 08:57:19 +00:00
|
|
|
|
2021-07-09 11:34:16 +00:00
|
|
|
let foundContent = waitFor portal.findContent(config.findContentTarget,
|
|
|
|
contentKey)
|
|
|
|
|
|
|
|
if foundContent.isOk():
|
|
|
|
echo foundContent.get()
|
|
|
|
else:
|
|
|
|
echo foundContent.error
|
|
|
|
|
|
|
|
of noCommand:
|
|
|
|
d.start()
|
2021-07-30 19:19:03 +00:00
|
|
|
portal.start()
|
2022-09-10 19:00:27 +00:00
|
|
|
waitFor(discover(d))
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
when isMainModule:
|
2021-12-13 08:06:29 +00:00
|
|
|
let config = PortalCliConf.load()
|
2021-07-09 11:34:16 +00:00
|
|
|
|
|
|
|
setLogLevel(config.logLevel)
|
|
|
|
|
|
|
|
run(config)
|