lighthouse/beacon_node/eth2-libp2p/src/discovery.rs

314 lines
12 KiB
Rust
Raw Normal View History

2019-06-25 04:51:45 +00:00
use crate::{error, NetworkConfig};
/// This manages the discovery and management of peers.
///
2019-07-01 06:38:42 +00:00
/// Currently using discv5 for peer discovery.
///
use futures::prelude::*;
use libp2p::core::swarm::{
ConnectedPoint, NetworkBehaviour, NetworkBehaviourAction, PollParameters,
};
2019-06-25 04:51:45 +00:00
use libp2p::core::{identity::Keypair, Multiaddr, PeerId, ProtocolsHandler};
use libp2p::discv5::{Discv5, Discv5Event};
use libp2p::enr::{Enr, EnrBuilder, NodeId};
use libp2p::multiaddr::Protocol;
2019-06-25 08:02:11 +00:00
use slog::{debug, info, o, warn};
2019-06-25 04:51:45 +00:00
use std::collections::HashSet;
2019-07-01 06:38:42 +00:00
use std::fs::File;
use std::io::prelude::*;
use std::str::FromStr;
use std::time::{Duration, Instant};
use tokio::io::{AsyncRead, AsyncWrite};
use tokio_timer::Delay;
2019-06-25 04:51:45 +00:00
/// Maximum seconds before searching for extra peers.
const MAX_TIME_BETWEEN_PEER_SEARCHES: u64 = 60;
2019-06-25 08:02:11 +00:00
/// Initial delay between peer searches.
const INITIAL_SEARCH_DELAY: u64 = 5;
2019-07-01 06:38:42 +00:00
/// Local ENR storage filename.
const ENR_FILENAME: &str = "enr.dat";
2019-06-25 04:51:45 +00:00
/// Lighthouse discovery behaviour. This provides peer management and discovery using the Discv5
/// libp2p protocol.
pub struct Discovery<TSubstream> {
2019-06-25 04:51:45 +00:00
/// The peers currently connected to libp2p streams.
connected_peers: HashSet<PeerId>,
/// The target number of connected peers on the libp2p interface.
max_peers: usize,
/// The delay between peer discovery searches.
peer_discovery_delay: Delay,
2019-06-25 04:51:45 +00:00
/// Tracks the last discovery delay. The delay is doubled each round until the max
/// time is reached.
past_discovery_delay: u64,
/// The TCP port for libp2p. Used to convert an updated IP address to a multiaddr. Note: This
/// assumes that the external TCP port is the same as the internal TCP port if behind a NAT.
//TODO: Improve NAT handling limit the above restriction
tcp_port: u16,
/// The discovery behaviour used to discover new peers.
discovery: Discv5<TSubstream>,
/// Logger for the discovery behaviour.
log: slog::Logger,
}
impl<TSubstream> Discovery<TSubstream> {
2019-06-25 04:51:45 +00:00
pub fn new(
local_key: &Keypair,
2019-07-01 06:38:42 +00:00
config: &NetworkConfig,
2019-06-25 04:51:45 +00:00
log: &slog::Logger,
) -> error::Result<Self> {
let log = log.new(o!("Service" => "Libp2p-Discovery"));
2019-06-25 04:51:45 +00:00
2019-07-01 06:38:42 +00:00
// checks if current ENR matches that found on disk
let local_enr = load_enr(local_key, config, &log)?;
2019-06-25 04:51:45 +00:00
info!(log, "Local ENR: {}", local_enr.to_base64());
2019-07-01 06:38:42 +00:00
debug!(log, "Local Node Id: {}", local_enr.node_id());
2019-06-25 04:51:45 +00:00
2019-07-01 06:38:42 +00:00
let mut discovery = Discv5::new(local_enr, local_key.clone(), config.listen_address)
2019-06-25 04:51:45 +00:00
.map_err(|e| format!("Discv5 service failed: {:?}", e))?;
// Add bootnodes to routing table
2019-07-01 06:38:42 +00:00
for bootnode_enr in config.boot_nodes.clone() {
2019-06-25 08:02:11 +00:00
debug!(
log,
"Adding node to routing table: {}",
bootnode_enr.node_id()
);
2019-06-25 04:51:45 +00:00
discovery.add_enr(bootnode_enr);
}
Ok(Self {
connected_peers: HashSet::new(),
2019-07-01 06:38:42 +00:00
max_peers: config.max_peers,
peer_discovery_delay: Delay::new(Instant::now()),
2019-06-25 08:02:11 +00:00
past_discovery_delay: INITIAL_SEARCH_DELAY,
2019-07-01 06:38:42 +00:00
tcp_port: config.libp2p_port,
2019-06-25 04:51:45 +00:00
discovery,
log,
2019-06-25 04:51:45 +00:00
})
}
2019-06-25 04:51:45 +00:00
/// Manually search for peers. This restarts the discovery round, sparking multiple rapid
/// queries.
pub fn discover_peers(&mut self) {
2019-06-25 08:02:11 +00:00
self.past_discovery_delay = INITIAL_SEARCH_DELAY;
2019-06-25 04:51:45 +00:00
self.find_peers();
}
2019-06-25 04:51:45 +00:00
/// Add an Enr to the routing table of the discovery mechanism.
pub fn add_enr(&mut self, enr: Enr) {
self.discovery.add_enr(enr);
}
2019-06-25 04:51:45 +00:00
/// Search for new peers using the underlying discovery mechanism.
fn find_peers(&mut self) {
// pick a random NodeId
let random_node = NodeId::random();
debug!(self.log, "Searching for peers...");
self.discovery.find_node(random_node);
// update the time until next discovery
let delay = {
if self.past_discovery_delay < MAX_TIME_BETWEEN_PEER_SEARCHES {
self.past_discovery_delay *= 2;
self.past_discovery_delay
} else {
MAX_TIME_BETWEEN_PEER_SEARCHES
}
};
self.peer_discovery_delay
.reset(Instant::now() + Duration::from_secs(delay));
}
}
2019-06-25 04:51:45 +00:00
// Redirect all behaviour events to underlying discovery behaviour.
impl<TSubstream> NetworkBehaviour for Discovery<TSubstream>
where
TSubstream: AsyncRead + AsyncWrite,
{
2019-06-25 04:51:45 +00:00
type ProtocolsHandler = <Discv5<TSubstream> as NetworkBehaviour>::ProtocolsHandler;
type OutEvent = <Discv5<TSubstream> as NetworkBehaviour>::OutEvent;
fn new_handler(&mut self) -> Self::ProtocolsHandler {
NetworkBehaviour::new_handler(&mut self.discovery)
}
fn addresses_of_peer(&mut self, peer_id: &PeerId) -> Vec<Multiaddr> {
2019-04-18 05:26:30 +00:00
// Let discovery track possible known peers.
self.discovery.addresses_of_peer(peer_id)
}
2019-06-25 04:51:45 +00:00
fn inject_connected(&mut self, peer_id: PeerId, _endpoint: ConnectedPoint) {
self.connected_peers.insert(peer_id);
}
2019-06-25 04:51:45 +00:00
fn inject_disconnected(&mut self, peer_id: &PeerId, _endpoint: ConnectedPoint) {
self.connected_peers.remove(peer_id);
}
2019-06-25 04:51:45 +00:00
fn inject_replaced(
&mut self,
_peer_id: PeerId,
_closed: ConnectedPoint,
_opened: ConnectedPoint,
) {
// discv5 doesn't implement
}
fn inject_node_event(
&mut self,
2019-06-25 04:51:45 +00:00
_peer_id: PeerId,
_event: <Self::ProtocolsHandler as ProtocolsHandler>::OutEvent,
) {
2019-06-25 04:51:45 +00:00
// discv5 doesn't implement
}
fn poll(
&mut self,
2019-06-25 08:57:11 +00:00
params: &mut impl PollParameters,
) -> Async<
NetworkBehaviourAction<
<Self::ProtocolsHandler as ProtocolsHandler>::InEvent,
Self::OutEvent,
>,
> {
2019-06-25 04:51:45 +00:00
// search of peers if it is time
loop {
match self.peer_discovery_delay.poll() {
Ok(Async::Ready(_)) => {
2019-06-25 08:02:11 +00:00
if self.connected_peers.len() < self.max_peers {
self.find_peers();
}
}
Ok(Async::NotReady) => break,
Err(e) => {
2019-06-25 04:51:45 +00:00
warn!(self.log, "Discovery peer search failed: {:?}", e);
}
}
}
2019-06-25 04:51:45 +00:00
// Poll discovery
2019-06-25 04:51:45 +00:00
loop {
match self.discovery.poll(params) {
Async::Ready(NetworkBehaviourAction::GenerateEvent(event)) => {
match event {
2019-06-25 08:02:11 +00:00
Discv5Event::Discovered(_enr) => {
// not concerned about FINDNODE results, rather the result of an entire
// query.
}
2019-06-25 04:51:45 +00:00
Discv5Event::SocketUpdated(socket) => {
info!(self.log, "Address updated"; "IP" => format!("{}",socket.ip()));
let mut address = Multiaddr::from(socket.ip());
address.push(Protocol::Tcp(self.tcp_port));
return Async::Ready(NetworkBehaviourAction::ReportObservedAddr {
address,
});
}
Discv5Event::FindNodeResult { closer_peers, .. } => {
debug!(self.log, "Discv5 query found {} peers", closer_peers.len());
if closer_peers.is_empty() {
2019-06-25 04:51:45 +00:00
debug!(self.log, "Discv5 random query yielded empty results");
}
2019-06-25 08:02:11 +00:00
for peer_id in closer_peers {
// if we need more peers, attempt a connection
if self.connected_peers.len() < self.max_peers
&& self.connected_peers.get(&peer_id).is_none()
{
debug!(self.log, "Discv5: Peer discovered"; "Peer"=> format!("{:?}", peer_id));
return Async::Ready(NetworkBehaviourAction::DialPeer {
peer_id,
});
}
}
}
_ => {}
2019-06-25 04:51:45 +00:00
}
}
// discv5 does not output any other NetworkBehaviourAction
Async::Ready(_) => {}
Async::NotReady => break,
}
}
Async::NotReady
}
}
2019-07-01 06:38:42 +00:00
/// Loads an ENR from file if it exists and matches the current NodeId and sequence number. If none
/// exists, generates a new one.
///
/// If an ENR exists, with the same NodeId and IP addresses, we use the disk-generated one as it's
/// ENR sequence will be equal or higher than a newly generated one.
fn load_enr(
local_key: &Keypair,
config: &NetworkConfig,
log: &slog::Logger,
) -> Result<Enr, String> {
// Build the local ENR.
// Note: Discovery should update the ENR record's IP to the external IP as seen by the
// majority of our peers.
let mut local_enr = EnrBuilder::new()
.ip(config.discovery_address.into())
.tcp(config.libp2p_port)
.udp(config.discovery_port)
.build(&local_key)
.map_err(|e| format!("Could not build Local ENR: {:?}", e))?;
let enr_f = config.network_dir.join(ENR_FILENAME);
if let Ok(mut enr_file) = File::open(enr_f.clone()) {
let mut enr_string = String::new();
match enr_file.read_to_string(&mut enr_string) {
Err(_) => debug!(log, "Could not read ENR from file"),
Ok(_) => {
match Enr::from_str(&enr_string) {
Ok(enr) => {
debug!(log, "ENR found in file: {:?}", enr_f);
if enr.node_id() == local_enr.node_id() {
if enr.ip() == config.discovery_address.into()
&& enr.tcp() == Some(config.libp2p_port)
&& enr.udp() == Some(config.discovery_port)
{
debug!(log, "ENR loaded from file");
// the stored ENR has the same configuration, use it
return Ok(enr);
}
// same node id, different configuration - update the sequence number
let new_seq_no = enr.seq().checked_add(1).ok_or_else(|| "ENR sequence number on file is too large. Remove it to generate a new NodeId")?;
local_enr.set_seq(new_seq_no, local_key).map_err(|e| {
format!("Could not update ENR sequence number: {:?}", e)
})?;
debug!(log, "ENR sequence number increased to: {}", new_seq_no);
}
}
Err(e) => {
warn!(log, "ENR from file could not be decoded: {:?}", e);
}
}
}
}
}
// write ENR to disk
let _ = std::fs::create_dir_all(&config.network_dir);
match File::create(enr_f.clone())
.and_then(|mut f| f.write_all(&local_enr.to_base64().as_bytes()))
{
Ok(_) => {
debug!(log, "ENR written to disk");
}
Err(e) => {
warn!(
log,
"Could not write ENR to file: {:?}. Error: {}", enr_f, e
);
}
}
Ok(local_enr)
}