@aztec/p2p 0.0.0-test.1 → 0.0.1-commit.03f7ef2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bootstrap/bootstrap.d.ts +1 -1
- package/dest/bootstrap/bootstrap.d.ts.map +1 -1
- package/dest/bootstrap/bootstrap.js +22 -9
- package/dest/client/factory.d.ts +15 -5
- package/dest/client/factory.d.ts.map +1 -1
- package/dest/client/factory.js +60 -25
- package/dest/client/index.d.ts +2 -1
- package/dest/client/index.d.ts.map +1 -1
- package/dest/client/index.js +1 -0
- package/dest/client/interface.d.ts +157 -0
- package/dest/client/interface.d.ts.map +1 -0
- package/dest/client/interface.js +9 -0
- package/dest/client/p2p_client.d.ts +75 -190
- package/dest/client/p2p_client.d.ts.map +1 -1
- package/dest/client/p2p_client.js +381 -183
- package/dest/config.d.ts +151 -125
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +183 -34
- package/dest/enr/generate-enr.d.ts +11 -3
- package/dest/enr/generate-enr.d.ts.map +1 -1
- package/dest/enr/generate-enr.js +27 -5
- package/dest/enr/index.d.ts +1 -1
- package/dest/errors/attestation-pool.error.d.ts +7 -0
- package/dest/errors/attestation-pool.error.d.ts.map +1 -0
- package/dest/errors/attestation-pool.error.js +12 -0
- package/dest/errors/reqresp.error.d.ts +1 -1
- package/dest/errors/reqresp.error.d.ts.map +1 -1
- package/dest/index.d.ts +4 -1
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +2 -0
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +68 -8
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +216 -65
- package/dest/mem_pools/attestation_pool/index.d.ts +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +21 -6
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +127 -26
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts +19 -6
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.js +111 -21
- package/dest/mem_pools/attestation_pool/mocks.d.ts +227 -7
- package/dest/mem_pools/attestation_pool/mocks.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/mocks.js +10 -16
- package/dest/mem_pools/index.d.ts +1 -1
- package/dest/mem_pools/instrumentation.d.ts +16 -12
- package/dest/mem_pools/instrumentation.d.ts.map +1 -1
- package/dest/mem_pools/instrumentation.js +57 -35
- package/dest/mem_pools/interface.d.ts +3 -4
- package/dest/mem_pools/interface.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts +64 -14
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.js +472 -97
- package/dest/mem_pools/tx_pool/index.d.ts +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts +36 -11
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.js +137 -36
- package/dest/mem_pools/tx_pool/priority.d.ts +1 -1
- package/dest/mem_pools/tx_pool/priority.js +1 -1
- package/dest/mem_pools/tx_pool/tx_pool.d.ts +67 -10
- package/dest/mem_pools/tx_pool/tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.js +273 -42
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +4 -2
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/attestation_validator.js +45 -9
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.d.ts +20 -0
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.d.ts.map +1 -0
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.js +67 -0
- package/dest/msg_validators/attestation_validator/index.d.ts +2 -1
- package/dest/msg_validators/attestation_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/index.js +1 -0
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +6 -2
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +73 -12
- package/dest/msg_validators/block_proposal_validator/index.d.ts +1 -1
- package/dest/msg_validators/index.d.ts +1 -1
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts +10 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts.map +1 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.js +36 -0
- package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts +3 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.js +27 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts +14 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/archive_cache.js +22 -0
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts +2 -2
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/block_header_validator.js +4 -4
- package/dest/msg_validators/tx_validator/data_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/data_validator.js +56 -86
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts +1 -3
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/double_spend_validator.js +21 -27
- package/dest/msg_validators/tx_validator/factory.d.ts +16 -0
- package/dest/msg_validators/tx_validator/factory.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/factory.js +74 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts +11 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/gas_validator.js +115 -0
- package/dest/msg_validators/tx_validator/index.d.ts +8 -1
- package/dest/msg_validators/tx_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/index.js +7 -0
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts +9 -5
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/metadata_validator.js +39 -20
- package/dest/msg_validators/tx_validator/phases_validator.d.ts +14 -0
- package/dest/msg_validators/tx_validator/phases_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/phases_validator.js +93 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts +17 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/test_utils.js +22 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts +13 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.js +32 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts +8 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.js +24 -0
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.js +6 -5
- package/dest/services/data_store.d.ts +1 -1
- package/dest/services/data_store.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.d.ts +10 -9
- package/dest/services/discv5/discV5_service.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.js +63 -36
- package/dest/services/dummy_service.d.ts +50 -11
- package/dest/services/dummy_service.d.ts.map +1 -1
- package/dest/services/dummy_service.js +88 -5
- package/dest/services/encoding.d.ts +26 -7
- package/dest/services/encoding.d.ts.map +1 -1
- package/dest/services/encoding.js +74 -6
- package/dest/services/gossipsub/scoring.d.ts +1 -1
- package/dest/services/index.d.ts +5 -1
- package/dest/services/index.d.ts.map +1 -1
- package/dest/services/index.js +4 -0
- package/dest/services/libp2p/instrumentation.d.ts +20 -0
- package/dest/services/libp2p/instrumentation.d.ts.map +1 -0
- package/dest/services/libp2p/instrumentation.js +164 -0
- package/dest/services/libp2p/libp2p_service.d.ts +78 -89
- package/dest/services/libp2p/libp2p_service.d.ts.map +1 -1
- package/dest/services/libp2p/libp2p_service.js +695 -248
- package/dest/services/peer-manager/interface.d.ts +23 -0
- package/dest/services/peer-manager/interface.d.ts.map +1 -0
- package/dest/services/peer-manager/interface.js +1 -0
- package/dest/services/peer-manager/metrics.d.ts +6 -2
- package/dest/services/peer-manager/metrics.d.ts.map +1 -1
- package/dest/services/peer-manager/metrics.js +22 -2
- package/dest/services/peer-manager/peer_manager.d.ts +102 -22
- package/dest/services/peer-manager/peer_manager.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_manager.js +549 -72
- package/dest/services/peer-manager/peer_scoring.d.ts +7 -2
- package/dest/services/peer-manager/peer_scoring.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_scoring.js +40 -2
- package/dest/services/reqresp/config.d.ts +11 -9
- package/dest/services/reqresp/config.d.ts.map +1 -1
- package/dest/services/reqresp/config.js +18 -4
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts +2 -2
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.js +10 -6
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts +31 -17
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/connection_sampler.js +142 -84
- package/dest/services/reqresp/index.d.ts +3 -2
- package/dest/services/reqresp/index.d.ts.map +1 -1
- package/dest/services/reqresp/index.js +2 -1
- package/dest/services/reqresp/interface.d.ts +73 -24
- package/dest/services/reqresp/interface.d.ts.map +1 -1
- package/dest/services/reqresp/interface.js +46 -27
- package/dest/services/reqresp/metrics.d.ts +1 -1
- package/dest/services/reqresp/metrics.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/auth.d.ts +43 -0
- package/dest/services/reqresp/protocols/auth.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/auth.js +71 -0
- package/dest/services/reqresp/protocols/block.d.ts +6 -1
- package/dest/services/reqresp/protocols/block.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/block.js +30 -6
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts +30 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts +11 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.js +39 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts +47 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts +4 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/index.js +3 -0
- package/dest/services/reqresp/protocols/goodbye.d.ts +3 -5
- package/dest/services/reqresp/protocols/goodbye.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/goodbye.js +7 -7
- package/dest/services/reqresp/protocols/index.d.ts +3 -1
- package/dest/services/reqresp/protocols/index.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/index.js +2 -0
- package/dest/services/reqresp/protocols/ping.d.ts +1 -3
- package/dest/services/reqresp/protocols/ping.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.d.ts +40 -7
- package/dest/services/reqresp/protocols/status.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.js +73 -5
- package/dest/services/reqresp/protocols/tx.d.ts +14 -4
- package/dest/services/reqresp/protocols/tx.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/tx.js +34 -6
- package/dest/services/reqresp/rate-limiter/index.d.ts +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts +6 -4
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.js +10 -2
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.js +21 -1
- package/dest/services/reqresp/reqresp.d.ts +24 -66
- package/dest/services/reqresp/reqresp.d.ts.map +1 -1
- package/dest/services/reqresp/reqresp.js +298 -207
- package/dest/services/reqresp/status.d.ts +10 -4
- package/dest/services/reqresp/status.d.ts.map +1 -1
- package/dest/services/reqresp/status.js +9 -2
- package/dest/services/service.d.ts +23 -19
- package/dest/services/service.d.ts.map +1 -1
- package/dest/services/tx_collection/config.d.ts +25 -0
- package/dest/services/tx_collection/config.d.ts.map +1 -0
- package/dest/services/tx_collection/config.js +58 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts +51 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/fast_tx_collection.js +300 -0
- package/dest/services/tx_collection/index.d.ts +3 -0
- package/dest/services/tx_collection/index.d.ts.map +1 -0
- package/dest/services/tx_collection/index.js +2 -0
- package/dest/services/tx_collection/instrumentation.d.ts +10 -0
- package/dest/services/tx_collection/instrumentation.d.ts.map +1 -0
- package/dest/services/tx_collection/instrumentation.js +34 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts +53 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/slow_tx_collection.js +177 -0
- package/dest/services/tx_collection/tx_collection.d.ts +110 -0
- package/dest/services/tx_collection/tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection.js +128 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts +30 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection_sink.js +111 -0
- package/dest/services/tx_collection/tx_source.d.ts +18 -0
- package/dest/services/tx_collection/tx_source.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_source.js +31 -0
- package/dest/services/tx_provider.d.ts +51 -0
- package/dest/services/tx_provider.d.ts.map +1 -0
- package/dest/services/tx_provider.js +217 -0
- package/dest/services/tx_provider_instrumentation.d.ts +16 -0
- package/dest/services/tx_provider_instrumentation.d.ts.map +1 -0
- package/dest/services/tx_provider_instrumentation.js +47 -0
- package/dest/test-helpers/generate-peer-id-private-keys.d.ts +1 -1
- package/dest/test-helpers/get-ports.d.ts +1 -1
- package/dest/test-helpers/get-ports.d.ts.map +1 -1
- package/dest/test-helpers/index.d.ts +2 -1
- package/dest/test-helpers/index.d.ts.map +1 -1
- package/dest/test-helpers/index.js +1 -0
- package/dest/test-helpers/make-enrs.d.ts +1 -1
- package/dest/test-helpers/make-enrs.d.ts.map +1 -1
- package/dest/test-helpers/make-enrs.js +4 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts +33 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts.map +1 -1
- package/dest/test-helpers/make-test-p2p-clients.js +86 -16
- package/dest/test-helpers/mock-pubsub.d.ts +59 -0
- package/dest/test-helpers/mock-pubsub.d.ts.map +1 -0
- package/dest/test-helpers/mock-pubsub.js +130 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts +12 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts.map +1 -0
- package/dest/test-helpers/mock-tx-helpers.js +19 -0
- package/dest/test-helpers/reqresp-nodes.d.ts +15 -11
- package/dest/test-helpers/reqresp-nodes.d.ts.map +1 -1
- package/dest/test-helpers/reqresp-nodes.js +62 -28
- package/dest/testbench/p2p_client_testbench_worker.d.ts +1 -1
- package/dest/testbench/p2p_client_testbench_worker.js +103 -29
- package/dest/testbench/parse_log_file.d.ts +1 -1
- package/dest/testbench/parse_log_file.js +4 -4
- package/dest/testbench/testbench.d.ts +1 -1
- package/dest/testbench/testbench.js +4 -4
- package/dest/testbench/worker_client_manager.d.ts +1 -6
- package/dest/testbench/worker_client_manager.d.ts.map +1 -1
- package/dest/testbench/worker_client_manager.js +11 -19
- package/dest/types/index.d.ts +4 -2
- package/dest/types/index.d.ts.map +1 -1
- package/dest/types/index.js +2 -0
- package/dest/util.d.ts +24 -16
- package/dest/util.d.ts.map +1 -1
- package/dest/util.js +75 -69
- package/dest/versioning.d.ts +4 -4
- package/dest/versioning.d.ts.map +1 -1
- package/dest/versioning.js +8 -3
- package/package.json +32 -27
- package/src/bootstrap/bootstrap.ts +27 -11
- package/src/client/factory.ts +139 -53
- package/src/client/index.ts +1 -0
- package/src/client/interface.ts +198 -0
- package/src/client/p2p_client.ts +484 -348
- package/src/config.ts +305 -134
- package/src/enr/generate-enr.ts +39 -6
- package/src/errors/attestation-pool.error.ts +13 -0
- package/src/index.ts +4 -0
- package/src/mem_pools/attestation_pool/attestation_pool.ts +75 -7
- package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +266 -67
- package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +174 -35
- package/src/mem_pools/attestation_pool/memory_attestation_pool.ts +156 -30
- package/src/mem_pools/attestation_pool/mocks.ts +13 -12
- package/src/mem_pools/instrumentation.ts +70 -40
- package/src/mem_pools/interface.ts +2 -4
- package/src/mem_pools/tx_pool/aztec_kv_tx_pool.ts +555 -110
- package/src/mem_pools/tx_pool/memory_tx_pool.ts +160 -46
- package/src/mem_pools/tx_pool/priority.ts +1 -1
- package/src/mem_pools/tx_pool/tx_pool.ts +69 -9
- package/src/mem_pools/tx_pool/tx_pool_test_suite.ts +224 -35
- package/src/msg_validators/attestation_validator/attestation_validator.ts +54 -11
- package/src/msg_validators/attestation_validator/fisherman_attestation_validator.ts +91 -0
- package/src/msg_validators/attestation_validator/index.ts +1 -0
- package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +82 -14
- package/src/msg_validators/msg_seen_validator/msg_seen_validator.ts +36 -0
- package/src/msg_validators/tx_validator/allowed_public_setup.ts +35 -0
- package/src/msg_validators/tx_validator/archive_cache.ts +28 -0
- package/src/msg_validators/tx_validator/block_header_validator.ts +5 -5
- package/src/msg_validators/tx_validator/data_validator.ts +81 -69
- package/src/msg_validators/tx_validator/double_spend_validator.ts +19 -17
- package/src/msg_validators/tx_validator/factory.ts +110 -0
- package/src/msg_validators/tx_validator/gas_validator.ts +134 -0
- package/src/msg_validators/tx_validator/index.ts +7 -0
- package/src/msg_validators/tx_validator/metadata_validator.ts +59 -22
- package/src/msg_validators/tx_validator/phases_validator.ts +116 -0
- package/src/msg_validators/tx_validator/test_utils.ts +43 -0
- package/src/msg_validators/tx_validator/timestamp_validator.ts +47 -0
- package/src/msg_validators/tx_validator/tx_permitted_validator.ts +17 -0
- package/src/msg_validators/tx_validator/tx_proof_validator.ts +6 -5
- package/src/services/discv5/discV5_service.ts +84 -38
- package/src/services/dummy_service.ts +147 -9
- package/src/services/encoding.ts +81 -6
- package/src/services/index.ts +4 -0
- package/src/services/libp2p/instrumentation.ts +167 -0
- package/src/services/libp2p/libp2p_service.ts +865 -298
- package/src/services/peer-manager/interface.ts +29 -0
- package/src/services/peer-manager/metrics.ts +26 -1
- package/src/services/peer-manager/peer_manager.ts +654 -78
- package/src/services/peer-manager/peer_scoring.ts +46 -3
- package/src/services/reqresp/config.ts +26 -9
- package/src/services/reqresp/connection-sampler/batch_connection_sampler.ts +12 -6
- package/src/services/reqresp/connection-sampler/connection_sampler.ts +148 -95
- package/src/services/reqresp/index.ts +2 -0
- package/src/services/reqresp/interface.ts +92 -37
- package/src/services/reqresp/metrics.ts +4 -1
- package/src/services/reqresp/protocols/auth.ts +83 -0
- package/src/services/reqresp/protocols/block.ts +26 -4
- package/src/services/reqresp/protocols/block_txs/bitvector.ts +90 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_handler.ts +53 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_reqresp.ts +79 -0
- package/src/services/reqresp/protocols/block_txs/index.ts +3 -0
- package/src/services/reqresp/protocols/goodbye.ts +9 -7
- package/src/services/reqresp/protocols/index.ts +2 -0
- package/src/services/reqresp/protocols/status.ts +118 -5
- package/src/services/reqresp/protocols/tx.ts +36 -8
- package/src/services/reqresp/rate-limiter/rate_limiter.ts +12 -3
- package/src/services/reqresp/rate-limiter/rate_limits.ts +21 -1
- package/src/services/reqresp/reqresp.ts +387 -256
- package/src/services/reqresp/status.ts +12 -3
- package/src/services/service.ts +45 -21
- package/src/services/tx_collection/config.ts +84 -0
- package/src/services/tx_collection/fast_tx_collection.ts +341 -0
- package/src/services/tx_collection/index.ts +2 -0
- package/src/services/tx_collection/instrumentation.ts +43 -0
- package/src/services/tx_collection/slow_tx_collection.ts +233 -0
- package/src/services/tx_collection/tx_collection.ts +216 -0
- package/src/services/tx_collection/tx_collection_sink.ts +129 -0
- package/src/services/tx_collection/tx_source.ts +37 -0
- package/src/services/tx_provider.ts +229 -0
- package/src/services/tx_provider_instrumentation.ts +61 -0
- package/src/test-helpers/index.ts +1 -0
- package/src/test-helpers/make-enrs.ts +4 -5
- package/src/test-helpers/make-test-p2p-clients.ts +111 -21
- package/src/test-helpers/mock-pubsub.ts +188 -0
- package/src/test-helpers/mock-tx-helpers.ts +24 -0
- package/src/test-helpers/reqresp-nodes.ts +87 -36
- package/src/testbench/p2p_client_testbench_worker.ts +151 -25
- package/src/testbench/parse_log_file.ts +4 -4
- package/src/testbench/testbench.ts +4 -4
- package/src/testbench/worker_client_manager.ts +17 -23
- package/src/types/index.ts +2 -0
- package/src/util.ts +105 -91
- package/src/versioning.ts +11 -4
|
@@ -4,18 +4,29 @@ function _ts_decorate(decorators, target, key, desc) {
|
|
|
4
4
|
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
5
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
6
|
}
|
|
7
|
+
import { makeEthSignDigest, tryRecoverAddress } from '@aztec/foundation/crypto/secp256k1-signer';
|
|
8
|
+
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
7
9
|
import { createLogger } from '@aztec/foundation/log';
|
|
10
|
+
import { bufferToHex } from '@aztec/foundation/string';
|
|
11
|
+
import { DateProvider } from '@aztec/foundation/timer';
|
|
8
12
|
import { trackSpan } from '@aztec/telemetry-client';
|
|
13
|
+
import { peerIdFromString } from '@libp2p/peer-id';
|
|
14
|
+
import { ENR } from '@nethermindeth/enr';
|
|
9
15
|
import { inspect } from 'util';
|
|
10
16
|
import { PeerEvent } from '../../types/index.js';
|
|
11
17
|
import { ReqRespSubProtocol } from '../reqresp/interface.js';
|
|
18
|
+
import { AuthRequest, AuthResponse } from '../reqresp/protocols/auth.js';
|
|
12
19
|
import { GoodByeReason, prettyGoodbyeReason } from '../reqresp/protocols/goodbye.js';
|
|
20
|
+
import { StatusMessage } from '../reqresp/protocols/status.js';
|
|
21
|
+
import { ReqRespStatus } from '../reqresp/status.js';
|
|
13
22
|
import { PeerManagerMetrics } from './metrics.js';
|
|
14
23
|
import { PeerScoreState } from './peer_scoring.js';
|
|
15
24
|
const MAX_DIAL_ATTEMPTS = 3;
|
|
16
25
|
const MAX_CACHED_PEERS = 100;
|
|
17
26
|
const MAX_CACHED_PEER_AGE_MS = 5 * 60 * 1000; // 5 minutes
|
|
18
27
|
const FAILED_PEER_BAN_TIME_MS = 5 * 60 * 1000; // 5 minutes timeout after failing MAX_DIAL_ATTEMPTS
|
|
28
|
+
const GOODBYE_DIAL_TIMEOUT_MS = 1000;
|
|
29
|
+
const FAILED_AUTH_HANDSHAKE_EXPIRY_MS = 60 * 60 * 1000; // 1 hour
|
|
19
30
|
export class PeerManager {
|
|
20
31
|
libP2PNode;
|
|
21
32
|
peerDiscoveryService;
|
|
@@ -23,44 +34,150 @@ export class PeerManager {
|
|
|
23
34
|
logger;
|
|
24
35
|
peerScoring;
|
|
25
36
|
reqresp;
|
|
37
|
+
worldStateSynchronizer;
|
|
38
|
+
protocolVersion;
|
|
39
|
+
epochCache;
|
|
40
|
+
dateProvider;
|
|
26
41
|
cachedPeers;
|
|
27
42
|
heartbeatCounter;
|
|
28
43
|
displayPeerCountsPeerHeartbeat;
|
|
29
44
|
timedOutPeers;
|
|
45
|
+
trustedPeers;
|
|
46
|
+
trustedPeersInitialized;
|
|
47
|
+
privatePeers;
|
|
48
|
+
privatePeersInitialized;
|
|
49
|
+
preferredPeers;
|
|
50
|
+
authenticatedPeerIdToValidatorAddress;
|
|
51
|
+
authenticatedValidatorAddressToPeerId;
|
|
52
|
+
peersToBeDisconnected;
|
|
53
|
+
failedAuthHandshakes;
|
|
54
|
+
validatorAddresses;
|
|
55
|
+
initializedPreferredPeers;
|
|
30
56
|
metrics;
|
|
31
|
-
|
|
32
|
-
constructor(libP2PNode, peerDiscoveryService, config, telemetryClient, logger = createLogger('p2p:peer-manager'), peerScoring, reqresp){
|
|
57
|
+
handlers;
|
|
58
|
+
constructor(libP2PNode, peerDiscoveryService, config, telemetryClient, logger = createLogger('p2p:peer-manager'), peerScoring, reqresp, worldStateSynchronizer, protocolVersion, epochCache, dateProvider = new DateProvider()){
|
|
33
59
|
this.libP2PNode = libP2PNode;
|
|
34
60
|
this.peerDiscoveryService = peerDiscoveryService;
|
|
35
61
|
this.config = config;
|
|
36
62
|
this.logger = logger;
|
|
37
63
|
this.peerScoring = peerScoring;
|
|
38
64
|
this.reqresp = reqresp;
|
|
65
|
+
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
66
|
+
this.protocolVersion = protocolVersion;
|
|
67
|
+
this.epochCache = epochCache;
|
|
68
|
+
this.dateProvider = dateProvider;
|
|
39
69
|
this.cachedPeers = new Map();
|
|
40
70
|
this.heartbeatCounter = 0;
|
|
41
71
|
this.displayPeerCountsPeerHeartbeat = 0;
|
|
42
72
|
this.timedOutPeers = new Map();
|
|
73
|
+
this.trustedPeers = new Set();
|
|
74
|
+
this.trustedPeersInitialized = false;
|
|
75
|
+
this.privatePeers = new Set();
|
|
76
|
+
this.privatePeersInitialized = false;
|
|
77
|
+
this.preferredPeers = new Set();
|
|
78
|
+
this.authenticatedPeerIdToValidatorAddress = new Map();
|
|
79
|
+
this.authenticatedValidatorAddressToPeerId = new Map();
|
|
80
|
+
this.peersToBeDisconnected = new Set();
|
|
81
|
+
this.failedAuthHandshakes = new Map();
|
|
82
|
+
this.validatorAddresses = [];
|
|
83
|
+
this.initializedPreferredPeers = false;
|
|
84
|
+
if (this.config.p2pDisableStatusHandshake && this.config.p2pAllowOnlyValidators) {
|
|
85
|
+
throw new Error('Status handshake disabled but is required to allow only validators to connect.');
|
|
86
|
+
}
|
|
43
87
|
this.metrics = new PeerManagerMetrics(telemetryClient, 'PeerManager');
|
|
88
|
+
// Handle Discovered peers
|
|
89
|
+
this.handlers = {
|
|
90
|
+
handleConnectedPeerEvent: this.handleConnectedPeerEvent.bind(this),
|
|
91
|
+
handleDisconnectedPeerEvent: this.handleDisconnectedPeerEvent.bind(this),
|
|
92
|
+
handleDiscoveredPeer: (enr)=>this.handleDiscoveredPeer(enr).catch((e)=>this.logger.error('Error handling discovered peer', e))
|
|
93
|
+
};
|
|
44
94
|
// Handle new established connections
|
|
45
|
-
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent
|
|
95
|
+
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
46
96
|
// Handle lost connections
|
|
47
|
-
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent
|
|
48
|
-
// Handle Discovered peers
|
|
49
|
-
this.discoveredPeerHandler = (enr)=>this.handleDiscoveredPeer(enr).catch((e)=>this.logger.error('Error handling discovered peer', e));
|
|
97
|
+
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
50
98
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
51
|
-
this.peerDiscoveryService
|
|
99
|
+
this.peerDiscoveryService?.on(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
52
100
|
// Display peer counts every 60 seconds
|
|
53
101
|
this.displayPeerCountsPeerHeartbeat = Math.floor(60_000 / this.config.peerCheckIntervalMS);
|
|
54
102
|
}
|
|
103
|
+
/**
|
|
104
|
+
* Initializes the trusted peers.
|
|
105
|
+
*
|
|
106
|
+
* This function is called when the peer manager is initialized.
|
|
107
|
+
*/ async initializePeers() {
|
|
108
|
+
if (this.config.trustedPeers) {
|
|
109
|
+
const trustedPeersEnrs = this.config.trustedPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
110
|
+
await Promise.all(trustedPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.trustedPeers.add(peerId.toString()))).finally(()=>{
|
|
111
|
+
this.trustedPeersInitialized = true;
|
|
112
|
+
}).catch((e)=>this.logger.error('Error initializing trusted peers', e));
|
|
113
|
+
}
|
|
114
|
+
if (this.config.privatePeers) {
|
|
115
|
+
const privatePeersEnrs = this.config.privatePeers.map((enr)=>ENR.decodeTxt(enr));
|
|
116
|
+
await Promise.all(privatePeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>{
|
|
117
|
+
this.trustedPeers.add(peerId.toString());
|
|
118
|
+
this.privatePeers.add(peerId.toString());
|
|
119
|
+
})).finally(()=>{
|
|
120
|
+
if (!this.config.trustedPeers) {
|
|
121
|
+
this.trustedPeersInitialized = true;
|
|
122
|
+
}
|
|
123
|
+
this.privatePeersInitialized = true;
|
|
124
|
+
}).catch((e)=>this.logger.error('Error initializing private peers', e));
|
|
125
|
+
}
|
|
126
|
+
if (this.config.preferredPeers) {
|
|
127
|
+
const preferredPeersEnrs = this.config.preferredPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
128
|
+
await Promise.all(preferredPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.preferredPeers.add(peerId.toString()))).catch((e)=>this.logger.error('Error initializing preferred peers', e));
|
|
129
|
+
}
|
|
130
|
+
}
|
|
55
131
|
get tracer() {
|
|
56
132
|
return this.metrics.tracer;
|
|
57
133
|
}
|
|
58
|
-
heartbeat() {
|
|
134
|
+
async heartbeat() {
|
|
59
135
|
this.heartbeatCounter++;
|
|
60
136
|
this.peerScoring.decayAllScores();
|
|
61
137
|
this.cleanupExpiredTimeouts();
|
|
138
|
+
await this.setupDirectPeersIfValidator();
|
|
139
|
+
await this.updateAuthenticatedPeers();
|
|
140
|
+
await this.processScheduledDisconnects();
|
|
62
141
|
this.discover();
|
|
63
142
|
}
|
|
143
|
+
/*
|
|
144
|
+
* If this node is connecting to preferred peers, make sure it is registered validator */ async setupDirectPeersIfValidator() {
|
|
145
|
+
if (!this.config.preferredPeers) {
|
|
146
|
+
return;
|
|
147
|
+
}
|
|
148
|
+
// Already initialized preferred peers, don't wastefully repeat the same work
|
|
149
|
+
if (this.initializedPreferredPeers) {
|
|
150
|
+
return;
|
|
151
|
+
}
|
|
152
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
153
|
+
const validatorSet = new Set(registeredValidators.map((v)=>v.toString()));
|
|
154
|
+
const isThisNodePartOfValidatorSet = this.validatorAddresses.some((v)=>validatorSet.has(v.toString()));
|
|
155
|
+
if (!isThisNodePartOfValidatorSet) {
|
|
156
|
+
return;
|
|
157
|
+
}
|
|
158
|
+
const preferredPeersEnrs = this.config.preferredPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
159
|
+
await Promise.all(preferredPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.preferredPeers.add(peerId.toString()))).catch((e)=>this.logger.error('Error initializing preferred peers', e));
|
|
160
|
+
const directPeers = (await Promise.all(preferredPeersEnrs.map(async (enr)=>{
|
|
161
|
+
const peerId = await enr.peerId();
|
|
162
|
+
const address = enr.getLocationMultiaddr('tcp');
|
|
163
|
+
if (address === undefined) {
|
|
164
|
+
throw new Error(`Direct peer ${peerId.toString()} has no TCP address, ENR: ${enr.encodeTxt()}`);
|
|
165
|
+
}
|
|
166
|
+
return {
|
|
167
|
+
id: peerId,
|
|
168
|
+
addrs: [
|
|
169
|
+
address
|
|
170
|
+
]
|
|
171
|
+
};
|
|
172
|
+
}))).filter((peer)=>peer !== undefined);
|
|
173
|
+
await Promise.all(directPeers.map((peer)=>{
|
|
174
|
+
this.libP2PNode.services.pubsub.direct.add(peer.id.toString());
|
|
175
|
+
return this.libP2PNode.peerStore.merge(peer.id, {
|
|
176
|
+
multiaddrs: peer.addrs
|
|
177
|
+
});
|
|
178
|
+
}));
|
|
179
|
+
this.initializedPreferredPeers = true;
|
|
180
|
+
}
|
|
64
181
|
/**
|
|
65
182
|
* Cleans up expired timeouts.
|
|
66
183
|
*
|
|
@@ -69,7 +186,7 @@ export class PeerManager {
|
|
|
69
186
|
* To give them a chance to reconnect.
|
|
70
187
|
*/ cleanupExpiredTimeouts() {
|
|
71
188
|
// Clean up expired timeouts
|
|
72
|
-
const now =
|
|
189
|
+
const now = this.dateProvider.now();
|
|
73
190
|
for (const [peerId, timedOutPeer] of this.timedOutPeers.entries()){
|
|
74
191
|
if (now >= timedOutPeer.timeoutUntilMs) {
|
|
75
192
|
this.timedOutPeers.delete(peerId);
|
|
@@ -77,26 +194,133 @@ export class PeerManager {
|
|
|
77
194
|
}
|
|
78
195
|
}
|
|
79
196
|
/**
|
|
80
|
-
*
|
|
197
|
+
* Processes scheduled disconnects during heartbeat.
|
|
198
|
+
*
|
|
199
|
+
* This batch processes all peers that have been marked for disconnect.
|
|
200
|
+
* preventing immediate disconnects that could cause libp2p state corruption.
|
|
201
|
+
*/ async processScheduledDisconnects() {
|
|
202
|
+
if (this.peersToBeDisconnected.size === 0) {
|
|
203
|
+
return;
|
|
204
|
+
}
|
|
205
|
+
const peersToDisconnect = Array.from(this.peersToBeDisconnected);
|
|
206
|
+
this.logger.debug(`Processing ${peersToDisconnect.length} scheduled disconnects`);
|
|
207
|
+
try {
|
|
208
|
+
await Promise.all(peersToDisconnect.map(async (peerIdStr)=>{
|
|
209
|
+
if (await this.disconnectPeer(peerIdFromString(peerIdStr))) {
|
|
210
|
+
this.peersToBeDisconnected.delete(peerIdStr);
|
|
211
|
+
}
|
|
212
|
+
}));
|
|
213
|
+
this.logger.verbose(`Disconnected ${peersToDisconnect.length} peers`, {
|
|
214
|
+
peersToDisconnect
|
|
215
|
+
});
|
|
216
|
+
} catch (error) {
|
|
217
|
+
this.logger.error('Error when disconnecting from peers', error);
|
|
218
|
+
}
|
|
219
|
+
}
|
|
220
|
+
/**
|
|
221
|
+
* Performs Status Handshake with a connected peer.
|
|
81
222
|
* @param e - The connected peer event.
|
|
82
223
|
*/ handleConnectedPeerEvent(e) {
|
|
83
224
|
const peerId = e.detail;
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
225
|
+
this.logger.verbose(`Connected to peer ${peerId.toString()}`);
|
|
226
|
+
if (this.config.p2pDisableStatusHandshake) {
|
|
227
|
+
return;
|
|
228
|
+
}
|
|
229
|
+
// If we are not configured to only allow validators then perform a status handshake
|
|
230
|
+
if (!this.config.p2pAllowOnlyValidators) {
|
|
231
|
+
void this.exchangeStatusHandshake(peerId);
|
|
232
|
+
return;
|
|
88
233
|
}
|
|
234
|
+
// We are configured to only allow validators, but this doesn't apply to trusted, private peers or preferred peers
|
|
235
|
+
if (this.isProtectedPeer(peerId)) {
|
|
236
|
+
void this.exchangeStatusHandshake(peerId);
|
|
237
|
+
return;
|
|
238
|
+
}
|
|
239
|
+
// Initiate auth handshake
|
|
240
|
+
void this.exchangeAuthHandshake(peerId);
|
|
89
241
|
}
|
|
90
242
|
/**
|
|
91
243
|
* Simply logs the type of disconnected peer.
|
|
92
244
|
* @param e - The disconnected peer event.
|
|
93
245
|
*/ handleDisconnectedPeerEvent(e) {
|
|
94
246
|
const peerId = e.detail;
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
this.logger.
|
|
247
|
+
this.logger.verbose(`Disconnected from peer ${peerId.toString()}`);
|
|
248
|
+
const validatorAddress = this.authenticatedPeerIdToValidatorAddress.get(peerId.toString());
|
|
249
|
+
if (validatorAddress !== undefined) {
|
|
250
|
+
this.logger.info(`Removing authentication for validator ${validatorAddress} at peer id ${peerId.toString()} due to disconnection`);
|
|
251
|
+
this.authenticatedValidatorAddressToPeerId.delete(validatorAddress.toString());
|
|
252
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peerId.toString());
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
registerThisValidatorAddresses(address) {
|
|
256
|
+
this.validatorAddresses = [
|
|
257
|
+
...address
|
|
258
|
+
];
|
|
259
|
+
}
|
|
260
|
+
/**
|
|
261
|
+
* Checks if a peer is trusted.
|
|
262
|
+
* @param peerId - The peer ID.
|
|
263
|
+
* @returns True if the peer is trusted, false otherwise.
|
|
264
|
+
* Note: This function will return false and log a warning if the trusted peers are not initialized.
|
|
265
|
+
*/ isTrustedPeer(peerId) {
|
|
266
|
+
if (!this.trustedPeersInitialized) {
|
|
267
|
+
this.logger.warn('Trusted peers not initialized, returning false');
|
|
268
|
+
return false;
|
|
99
269
|
}
|
|
270
|
+
return this.trustedPeers.has(peerId.toString());
|
|
271
|
+
}
|
|
272
|
+
/**
|
|
273
|
+
* Adds a peer to the trusted peers set.
|
|
274
|
+
* @param peerId - The peer ID to add to trusted peers.
|
|
275
|
+
*/ addTrustedPeer(peerId) {
|
|
276
|
+
const peerIdStr = peerId.toString();
|
|
277
|
+
this.trustedPeers.add(peerIdStr);
|
|
278
|
+
this.trustedPeersInitialized = true;
|
|
279
|
+
this.logger.verbose(`Added trusted peer ${peerIdStr}`);
|
|
280
|
+
}
|
|
281
|
+
/**
|
|
282
|
+
* Adds a peer to the private peers set.
|
|
283
|
+
* @param peerId - The peer ID to add to private peers.
|
|
284
|
+
*/ addPrivatePeer(peerId) {
|
|
285
|
+
const peerIdStr = peerId.toString();
|
|
286
|
+
this.trustedPeers.add(peerIdStr);
|
|
287
|
+
this.privatePeers.add(peerIdStr);
|
|
288
|
+
this.trustedPeersInitialized = true;
|
|
289
|
+
this.privatePeersInitialized = true;
|
|
290
|
+
this.logger.verbose(`Added private peer ${peerIdStr}`);
|
|
291
|
+
}
|
|
292
|
+
/**
|
|
293
|
+
* Checks if a peer is private.
|
|
294
|
+
* @param peerId - The peer ID.
|
|
295
|
+
* @returns True if the peer is private, false otherwise.
|
|
296
|
+
*/ isPrivatePeer(peerId) {
|
|
297
|
+
if (!this.privatePeersInitialized) {
|
|
298
|
+
this.logger.warn('Private peers not initialized, returning false');
|
|
299
|
+
return false;
|
|
300
|
+
}
|
|
301
|
+
return this.privatePeers.has(peerId.toString());
|
|
302
|
+
}
|
|
303
|
+
/**
|
|
304
|
+
* Adds a peer to the preferred peers set.
|
|
305
|
+
* @param peerId - The peer ID to add to preferred peers.
|
|
306
|
+
*/ addPreferredPeer(peerId) {
|
|
307
|
+
const peerIdStr = peerId.toString();
|
|
308
|
+
this.preferredPeers.add(peerIdStr);
|
|
309
|
+
this.logger.verbose(`Added preferred peer ${peerIdStr}`);
|
|
310
|
+
}
|
|
311
|
+
/**
|
|
312
|
+
* Checks if a peer is preferred.
|
|
313
|
+
* @param peerId - The peer ID.
|
|
314
|
+
* @returns True if the peer is preferred, false otherwise.
|
|
315
|
+
*/ isPreferredPeer(peerId) {
|
|
316
|
+
return this.preferredPeers.has(peerId.toString());
|
|
317
|
+
}
|
|
318
|
+
/**
|
|
319
|
+
* Checks if a peer is protected (either trusted or private).
|
|
320
|
+
* @param peerId - The peer ID.
|
|
321
|
+
* @returns True if the peer is protected, false otherwise.
|
|
322
|
+
*/ isProtectedPeer(peerId) {
|
|
323
|
+
return this.isTrustedPeer(peerId) || this.isPrivatePeer(peerId) || this.isPreferredPeer(peerId);
|
|
100
324
|
}
|
|
101
325
|
/**
|
|
102
326
|
* Handles a goodbye received from a peer.
|
|
@@ -107,7 +331,7 @@ export class PeerManager {
|
|
|
107
331
|
*/ goodbyeReceived(peerId, reason) {
|
|
108
332
|
this.logger.debug(`Goodbye received from peer ${peerId.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
109
333
|
this.metrics.recordGoodbyeReceived(reason);
|
|
110
|
-
|
|
334
|
+
this.markPeerForDisconnect(peerId);
|
|
111
335
|
}
|
|
112
336
|
penalizePeer(peerId, penalty) {
|
|
113
337
|
this.peerScoring.penalizePeer(peerId, penalty);
|
|
@@ -115,6 +339,10 @@ export class PeerManager {
|
|
|
115
339
|
getPeerScore(peerId) {
|
|
116
340
|
return this.peerScoring.getScore(peerId);
|
|
117
341
|
}
|
|
342
|
+
shouldDisableP2PGossip(peerId) {
|
|
343
|
+
const isAuthenticated = this.isAuthenticatedPeer(peerIdFromString(peerId));
|
|
344
|
+
return (this.config.p2pAllowOnlyValidators ?? false) && !isAuthenticated;
|
|
345
|
+
}
|
|
118
346
|
getPeers(includePending = false) {
|
|
119
347
|
const connected = this.libP2PNode.getPeers().map((peer)=>({
|
|
120
348
|
id: peer.toString(),
|
|
@@ -145,30 +373,56 @@ export class PeerManager {
|
|
|
145
373
|
...cachedPeers
|
|
146
374
|
];
|
|
147
375
|
}
|
|
376
|
+
isAuthenticatedPeer(peerId) {
|
|
377
|
+
const peerIdAsString = peerId.toString();
|
|
378
|
+
return this.privatePeers.has(peerIdAsString) || this.trustedPeers.has(peerIdAsString) || this.preferredPeers.has(peerIdAsString) || this.authenticatedPeerIdToValidatorAddress.has(peerIdAsString);
|
|
379
|
+
}
|
|
380
|
+
/*
|
|
381
|
+
* Checks whether peer is allowed to connect
|
|
382
|
+
*
|
|
383
|
+
* @param id: Address of the node or it's peerId
|
|
384
|
+
*
|
|
385
|
+
* @returns: True if node is allowed to connect, otherwise false
|
|
386
|
+
* */ isNodeAllowedToConnect(id) {
|
|
387
|
+
const entry = this.failedAuthHandshakes.get(id.toString());
|
|
388
|
+
if (!entry) {
|
|
389
|
+
return true;
|
|
390
|
+
}
|
|
391
|
+
// In case entry is too old, remove it and allow connection
|
|
392
|
+
if (this.dateProvider.now() - entry.lastFailureTimestamp > FAILED_AUTH_HANDSHAKE_EXPIRY_MS) {
|
|
393
|
+
this.failedAuthHandshakes.delete(id.toString());
|
|
394
|
+
return true;
|
|
395
|
+
}
|
|
396
|
+
return entry.count <= this.config.p2pMaxFailedAuthAttemptsAllowed;
|
|
397
|
+
}
|
|
148
398
|
/**
|
|
149
399
|
* Discovers peers.
|
|
150
400
|
*/ discover() {
|
|
151
401
|
const connections = this.libP2PNode.getConnections();
|
|
152
|
-
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.
|
|
402
|
+
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.getNonProtectedPeers(connections)));
|
|
153
403
|
// Calculate how many connections we're looking to make
|
|
154
|
-
const
|
|
404
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
405
|
+
const peersToConnect = this.config.maxPeerCount - healthyConnections.length - protectedPeerCount;
|
|
155
406
|
const logLevel = this.heartbeatCounter % this.displayPeerCountsPeerHeartbeat === 0 ? 'info' : 'debug';
|
|
156
|
-
this.logger[logLevel](`Connected to ${healthyConnections.length} peers`, {
|
|
157
|
-
|
|
407
|
+
this.logger[logLevel](`Connected to ${healthyConnections.length + this.trustedPeers.size} peers`, {
|
|
408
|
+
discoveredConnections: healthyConnections.length,
|
|
409
|
+
protectedConnections: protectedPeerCount,
|
|
158
410
|
maxPeerCount: this.config.maxPeerCount,
|
|
159
411
|
cachedPeers: this.cachedPeers.size,
|
|
160
412
|
...this.peerScoring.getStats()
|
|
161
413
|
});
|
|
414
|
+
this.metrics.recordPeerCount(healthyConnections.length);
|
|
162
415
|
// Exit if no peers to connect
|
|
163
416
|
if (peersToConnect <= 0) {
|
|
164
417
|
return;
|
|
165
418
|
}
|
|
166
419
|
const cachedPeersToDial = [];
|
|
167
420
|
const pendingDials = new Set(this.libP2PNode.getDialQueue().map((pendingDial)=>pendingDial.peerId?.toString()).filter(Boolean));
|
|
421
|
+
const now = this.dateProvider.now();
|
|
168
422
|
for (const [id, peerData] of this.cachedPeers.entries()){
|
|
169
423
|
// if already dialling or connected to, remove from cache
|
|
170
424
|
if (pendingDials.has(id) || healthyConnections.some((conn)=>conn.remotePeer.equals(peerData.peerId)) || // if peer has been in cache for the max cache age, remove from cache
|
|
171
|
-
|
|
425
|
+
now - peerData.addedUnixMs > MAX_CACHED_PEER_AGE_MS) {
|
|
172
426
|
this.cachedPeers.delete(id);
|
|
173
427
|
} else {
|
|
174
428
|
// cachedPeersToDial.set(id, enr);
|
|
@@ -188,15 +442,23 @@ export class PeerManager {
|
|
|
188
442
|
void this.peerDiscoveryService.runRandomNodesQuery();
|
|
189
443
|
}
|
|
190
444
|
}
|
|
445
|
+
getNonProtectedPeers(connections) {
|
|
446
|
+
return connections.filter((conn)=>!this.isProtectedPeer(conn.remotePeer));
|
|
447
|
+
}
|
|
448
|
+
getProtectedPeerCount() {
|
|
449
|
+
return this.trustedPeers.size + this.privatePeers.size + this.preferredPeers.size;
|
|
450
|
+
}
|
|
191
451
|
pruneUnhealthyPeers(connections) {
|
|
192
452
|
const connectedHealthyPeers = [];
|
|
193
453
|
for (const peer of connections){
|
|
194
454
|
const score = this.peerScoring.getScoreState(peer.remotePeer.toString());
|
|
195
455
|
switch(score){
|
|
196
456
|
case PeerScoreState.Banned:
|
|
457
|
+
this.metrics.recordLowScoreDisconnect('Banned');
|
|
197
458
|
void this.goodbyeAndDisconnectPeer(peer.remotePeer, GoodByeReason.BANNED);
|
|
198
459
|
break;
|
|
199
460
|
case PeerScoreState.Disconnect:
|
|
461
|
+
this.metrics.recordLowScoreDisconnect('Disconnect');
|
|
200
462
|
void this.goodbyeAndDisconnectPeer(peer.remotePeer, GoodByeReason.LOW_SCORE);
|
|
201
463
|
break;
|
|
202
464
|
case PeerScoreState.Healthy:
|
|
@@ -211,72 +473,69 @@ export class PeerManager {
|
|
|
211
473
|
* @param connections - The list of connections to prune low scoring peers above the max peer count from.
|
|
212
474
|
* @returns The pruned list of connections.
|
|
213
475
|
*/ prioritizePeers(connections) {
|
|
214
|
-
|
|
215
|
-
|
|
476
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
477
|
+
if (connections.length > this.config.maxPeerCount - protectedPeerCount) {
|
|
478
|
+
// Sort the regular peer scores from highest to lowest
|
|
216
479
|
const prioritizedConnections = connections.sort((connectionA, connectionB)=>{
|
|
217
480
|
const connectionScoreA = this.peerScoring.getScore(connectionA.remotePeer.toString());
|
|
218
481
|
const connectionScoreB = this.peerScoring.getScore(connectionB.remotePeer.toString());
|
|
219
482
|
return connectionScoreB - connectionScoreA;
|
|
220
483
|
});
|
|
221
|
-
//
|
|
222
|
-
|
|
484
|
+
// Calculate how many regular peers we can keep
|
|
485
|
+
const peersToKeep = Math.max(0, this.config.maxPeerCount - protectedPeerCount);
|
|
486
|
+
// Disconnect from the lowest scoring regular connections that exceed our limit
|
|
487
|
+
for (const conn of prioritizedConnections.slice(peersToKeep)){
|
|
223
488
|
void this.goodbyeAndDisconnectPeer(conn.remotePeer, GoodByeReason.MAX_PEERS);
|
|
224
489
|
}
|
|
225
|
-
|
|
490
|
+
// Return trusted connections plus the highest scoring regular connections up to the max peer count
|
|
491
|
+
return prioritizedConnections.slice(0, peersToKeep);
|
|
226
492
|
} else {
|
|
227
493
|
return connections;
|
|
228
494
|
}
|
|
229
495
|
}
|
|
230
|
-
/**
|
|
231
|
-
* If multiple connections to the same peer are found, the oldest connection is kept and the duplicates are pruned.
|
|
232
|
-
*
|
|
233
|
-
* This is necessary to resolve a race condition where multiple connections to the same peer are established if
|
|
234
|
-
* they are discovered at the same time.
|
|
235
|
-
*
|
|
236
|
-
* @param connections - The list of connections to prune duplicate peers from.
|
|
237
|
-
* @returns The pruned list of connections.
|
|
238
|
-
*/ pruneDuplicatePeers(connections) {
|
|
239
|
-
const peerConnections = new Map();
|
|
240
|
-
for (const conn of connections){
|
|
241
|
-
const peerId = conn.remotePeer.toString();
|
|
242
|
-
const existingConnection = peerConnections.get(peerId);
|
|
243
|
-
if (!existingConnection) {
|
|
244
|
-
peerConnections.set(peerId, conn);
|
|
245
|
-
} else {
|
|
246
|
-
// Keep the oldest connection for each peer
|
|
247
|
-
this.logger.debug(`Found duplicate connection to peer ${peerId}, keeping oldest connection`);
|
|
248
|
-
if (conn.timeline.open < existingConnection.timeline.open) {
|
|
249
|
-
peerConnections.set(peerId, conn);
|
|
250
|
-
void existingConnection.close();
|
|
251
|
-
} else {
|
|
252
|
-
void conn.close();
|
|
253
|
-
}
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
return [
|
|
257
|
-
...peerConnections.values()
|
|
258
|
-
];
|
|
259
|
-
}
|
|
260
496
|
async goodbyeAndDisconnectPeer(peer, reason) {
|
|
261
497
|
this.logger.debug(`Disconnecting peer ${peer.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
262
498
|
this.metrics.recordGoodbyeSent(reason);
|
|
263
499
|
try {
|
|
264
|
-
await this.reqresp.sendRequestToPeer(peer, ReqRespSubProtocol.GOODBYE, Buffer.from([
|
|
500
|
+
const resp = await this.reqresp.sendRequestToPeer(peer, ReqRespSubProtocol.GOODBYE, Buffer.from([
|
|
265
501
|
reason
|
|
266
|
-
]));
|
|
502
|
+
]), GOODBYE_DIAL_TIMEOUT_MS);
|
|
503
|
+
if (resp.status === ReqRespStatus.FAILURE) {
|
|
504
|
+
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}`);
|
|
505
|
+
} else if (resp.status === ReqRespStatus.SUCCESS) {
|
|
506
|
+
this.logger.verbose(`Sent goodbye to peer ${peer.toString()}`);
|
|
507
|
+
} else {
|
|
508
|
+
this.logger.debug(`Unexpected status sending goodbye to peer ${peer.toString()}: ${ReqRespStatus[resp.status]}`);
|
|
509
|
+
}
|
|
267
510
|
} catch (error) {
|
|
268
511
|
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}: ${error}`);
|
|
269
512
|
} finally{
|
|
270
|
-
|
|
513
|
+
this.markPeerForDisconnect(peer);
|
|
271
514
|
}
|
|
272
515
|
}
|
|
273
|
-
|
|
516
|
+
/*
|
|
517
|
+
* Marks peer to be disconnected on the next heartbeat
|
|
518
|
+
* */ markPeerForDisconnect(peer) {
|
|
519
|
+
const peerIdStr = peer.toString();
|
|
520
|
+
this.logger.debug(`Scheduling peer ${peerIdStr} for disconnection`);
|
|
521
|
+
this.peersToBeDisconnected.add(peerIdStr);
|
|
522
|
+
}
|
|
523
|
+
/**
|
|
524
|
+
* Performs the actual disconnection of a peer.
|
|
525
|
+
* This is called during heartbeat processing to avoid immediate disconnections.
|
|
526
|
+
*
|
|
527
|
+
* @returns True if peer was disconnect, otherwise false
|
|
528
|
+
*/ async disconnectPeer(peer) {
|
|
529
|
+
const peerIdStr = peer.toString();
|
|
274
530
|
try {
|
|
275
531
|
await this.libP2PNode.hangUp(peer);
|
|
532
|
+
this.logger.debug(`Successfully disconnected peer ${peerIdStr}`);
|
|
533
|
+
return true;
|
|
276
534
|
} catch (error) {
|
|
277
|
-
this.logger.
|
|
278
|
-
error
|
|
535
|
+
this.logger.warn(`Failed to disconnect peer ${peerIdStr}`, {
|
|
536
|
+
error
|
|
279
537
|
});
|
|
538
|
+
return false;
|
|
280
539
|
}
|
|
281
540
|
}
|
|
282
541
|
/**
|
|
@@ -286,10 +545,15 @@ export class PeerManager {
|
|
|
286
545
|
// Check that the peer has not already been banned
|
|
287
546
|
const peerId = await enr.peerId();
|
|
288
547
|
const peerIdString = peerId.toString();
|
|
548
|
+
// Don't attempt to connect to peers scheduled for disconnection
|
|
549
|
+
if (this.peersToBeDisconnected.has(peerIdString)) {
|
|
550
|
+
this.logger.trace(`Skipping peer scheduled for disconnection ${peerId}`);
|
|
551
|
+
return;
|
|
552
|
+
}
|
|
289
553
|
// Check if peer is temporarily timed out
|
|
290
554
|
const timedOutPeer = this.timedOutPeers.get(peerIdString);
|
|
291
555
|
if (timedOutPeer) {
|
|
292
|
-
if (
|
|
556
|
+
if (this.dateProvider.now() < timedOutPeer.timeoutUntilMs) {
|
|
293
557
|
this.logger.trace(`Skipping timed out peer ${peerId}`);
|
|
294
558
|
return;
|
|
295
559
|
}
|
|
@@ -325,7 +589,7 @@ export class PeerManager {
|
|
|
325
589
|
enr,
|
|
326
590
|
multiaddrTcp,
|
|
327
591
|
dialAttempts: 0,
|
|
328
|
-
addedUnixMs:
|
|
592
|
+
addedUnixMs: this.dateProvider.now()
|
|
329
593
|
};
|
|
330
594
|
// Determine if we should dial immediately or not
|
|
331
595
|
if (this.shouldDialPeer()) {
|
|
@@ -364,7 +628,7 @@ export class PeerManager {
|
|
|
364
628
|
// Add to timed out peers
|
|
365
629
|
this.timedOutPeers.set(id, {
|
|
366
630
|
peerId: id,
|
|
367
|
-
timeoutUntilMs:
|
|
631
|
+
timeoutUntilMs: this.dateProvider.now() + FAILED_PEER_BAN_TIME_MS
|
|
368
632
|
});
|
|
369
633
|
}
|
|
370
634
|
}
|
|
@@ -383,7 +647,11 @@ export class PeerManager {
|
|
|
383
647
|
return;
|
|
384
648
|
}
|
|
385
649
|
// Remove the oldest peers
|
|
386
|
-
for (const key of this.cachedPeers.
|
|
650
|
+
for (const [key, value] of this.cachedPeers.entries()){
|
|
651
|
+
if (this.isProtectedPeer(value.peerId)) {
|
|
652
|
+
this.logger.debug(`Not pruning trusted peer ${key}`);
|
|
653
|
+
continue;
|
|
654
|
+
}
|
|
387
655
|
this.cachedPeers.delete(key);
|
|
388
656
|
this.logger.trace(`Pruning peer ${key} from cache`);
|
|
389
657
|
peersToDelete--;
|
|
@@ -392,16 +660,225 @@ export class PeerManager {
|
|
|
392
660
|
}
|
|
393
661
|
}
|
|
394
662
|
}
|
|
663
|
+
async createStatusMessage() {
|
|
664
|
+
const syncSummary = (await this.worldStateSynchronizer.status()).syncSummary;
|
|
665
|
+
return StatusMessage.fromWorldStateSyncStatus(this.protocolVersion, syncSummary);
|
|
666
|
+
}
|
|
667
|
+
/**
|
|
668
|
+
* Performs status Handshake with the Peer
|
|
669
|
+
* The way the protocol is designed is that each peer will call this method on newly established p2p connection.
|
|
670
|
+
* Both peers request Status message and both peers perform validation of the received Status message.
|
|
671
|
+
* If this validation fails on any end that peer will initiate disconnect.
|
|
672
|
+
* Note: It's important for both peers to request and perform Status validation,
|
|
673
|
+
* Because one of the peers can be _bad peer_ and this peer can simply skip the check.
|
|
674
|
+
* If we don't implement validation on both ends the _bad peer_ remains connected.
|
|
675
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
676
|
+
* */ async exchangeStatusHandshake(peerId) {
|
|
677
|
+
try {
|
|
678
|
+
const ourStatus = await this.createStatusMessage();
|
|
679
|
+
//Note: Technically we don't have to send out status to peer as well, but we do.
|
|
680
|
+
//It will be easier to update protocol in the future this way if need be.
|
|
681
|
+
this.logger.trace(`Initiating status handshake with peer ${peerId}`);
|
|
682
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.STATUS, ourStatus.toBuffer());
|
|
683
|
+
const { status } = response;
|
|
684
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
685
|
+
//TODO: maybe hard ban these peers in the future.
|
|
686
|
+
//We could allow this to happen up to N times, and then hard ban?
|
|
687
|
+
//Hard ban: Disallow connection via e.g. libp2p's Gater
|
|
688
|
+
this.logger.debug(`Disconnecting peer ${peerId} who failed to respond status handshake`, {
|
|
689
|
+
peerId,
|
|
690
|
+
status: ReqRespStatus[status]
|
|
691
|
+
});
|
|
692
|
+
this.markPeerForDisconnect(peerId);
|
|
693
|
+
return;
|
|
694
|
+
}
|
|
695
|
+
const { data } = response;
|
|
696
|
+
const logData = {
|
|
697
|
+
peerId,
|
|
698
|
+
status: ReqRespStatus[status],
|
|
699
|
+
data: data ? bufferToHex(data) : undefined
|
|
700
|
+
};
|
|
701
|
+
const peerStatusMessage = StatusMessage.fromBuffer(data);
|
|
702
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
703
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to failed status handshake.`, logData);
|
|
704
|
+
this.markPeerForDisconnect(peerId);
|
|
705
|
+
return;
|
|
706
|
+
}
|
|
707
|
+
this.logger.debug(`Successfully completed status handshake with peer ${peerId}`, logData);
|
|
708
|
+
} catch (err) {
|
|
709
|
+
//TODO: maybe hard ban these peers in the future
|
|
710
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to error during status handshake: ${err.message ?? err}`, {
|
|
711
|
+
peerId
|
|
712
|
+
});
|
|
713
|
+
this.markPeerForDisconnect(peerId);
|
|
714
|
+
}
|
|
715
|
+
}
|
|
716
|
+
/**
|
|
717
|
+
* Performs auth Handshake with the Peer
|
|
718
|
+
* A superset of the status handshake. Also includes a challenge that needs to be signed by the peer's validator key.
|
|
719
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
720
|
+
* */ async exchangeAuthHandshake(peerId) {
|
|
721
|
+
const peerIdString = peerId.toString();
|
|
722
|
+
try {
|
|
723
|
+
const ourStatus = await this.createStatusMessage();
|
|
724
|
+
const authRequest = new AuthRequest(ourStatus, Fr.random());
|
|
725
|
+
// Note: Technically we don't have to send our status to peer as well, but we do.
|
|
726
|
+
// It will be easier to update protocol in the future this way if need be.
|
|
727
|
+
// We also need to send the challenge at least, so that the peer can sign it.
|
|
728
|
+
this.logger.debug(`Initiating auth handshake with peer ${peerId}`);
|
|
729
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.AUTH, authRequest.toBuffer());
|
|
730
|
+
const { status } = response;
|
|
731
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
732
|
+
this.logger.verbose(`Disconnecting peer ${peerId} who failed to respond auth handshake`, {
|
|
733
|
+
peerId,
|
|
734
|
+
status: ReqRespStatus[status]
|
|
735
|
+
});
|
|
736
|
+
this.markAuthHandshakeFailed(peerId);
|
|
737
|
+
this.markPeerForDisconnect(peerId);
|
|
738
|
+
return;
|
|
739
|
+
}
|
|
740
|
+
const { data } = response;
|
|
741
|
+
const logData = {
|
|
742
|
+
peerId,
|
|
743
|
+
status: ReqRespStatus[status],
|
|
744
|
+
data: data ? bufferToHex(data) : undefined
|
|
745
|
+
};
|
|
746
|
+
const peerAuthResponse = AuthResponse.fromBuffer(data);
|
|
747
|
+
const peerStatusMessage = peerAuthResponse.status;
|
|
748
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
749
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed status handshake as part of auth.`, logData);
|
|
750
|
+
this.markAuthHandshakeFailed(peerId);
|
|
751
|
+
this.markPeerForDisconnect(peerId);
|
|
752
|
+
return;
|
|
753
|
+
}
|
|
754
|
+
const hashToRecover = authRequest.getPayloadToSign();
|
|
755
|
+
const ethSignedHash = makeEthSignDigest(hashToRecover);
|
|
756
|
+
const sender = tryRecoverAddress(ethSignedHash, peerAuthResponse.signature);
|
|
757
|
+
if (!sender) {
|
|
758
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, invalid signature.`, logData);
|
|
759
|
+
this.markAuthHandshakeFailed(peerId);
|
|
760
|
+
this.markPeerForDisconnect(peerId);
|
|
761
|
+
return;
|
|
762
|
+
}
|
|
763
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
764
|
+
const found = registeredValidators.find((v)=>v.toString() === sender.toString()) !== undefined;
|
|
765
|
+
if (!found) {
|
|
766
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, peer is not a registered validator.`, {
|
|
767
|
+
...logData,
|
|
768
|
+
address: sender.toString()
|
|
769
|
+
});
|
|
770
|
+
this.markAuthHandshakeFailed(peerId);
|
|
771
|
+
this.markPeerForDisconnect(peerId);
|
|
772
|
+
return;
|
|
773
|
+
}
|
|
774
|
+
// Check to see that this validator address isn't already allocated to a different peer
|
|
775
|
+
const peerForAddress = this.authenticatedValidatorAddressToPeerId.get(sender.toString());
|
|
776
|
+
if (peerForAddress !== undefined && peerForAddress.toString() !== peerIdString) {
|
|
777
|
+
this.logger.verbose(`Received auth for validator ${sender.toString()} from peer ${peerIdString}, but this validator is already authenticated to peer ${peerForAddress.toString()}`, {
|
|
778
|
+
...logData,
|
|
779
|
+
address: sender.toString()
|
|
780
|
+
});
|
|
781
|
+
return;
|
|
782
|
+
}
|
|
783
|
+
this.markAuthHandshakeSuccess(peerId);
|
|
784
|
+
this.authenticatedPeerIdToValidatorAddress.set(peerIdString, sender);
|
|
785
|
+
this.authenticatedValidatorAddressToPeerId.set(sender.toString(), peerId);
|
|
786
|
+
this.logger.info(`Successfully completed auth handshake with peer ${peerId}, validator address ${sender.toString()}`, {
|
|
787
|
+
...logData,
|
|
788
|
+
address: sender.toString()
|
|
789
|
+
});
|
|
790
|
+
} catch (err) {
|
|
791
|
+
//TODO: maybe hard ban these peers in the future
|
|
792
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to error during auth handshake: ${err.message}`, {
|
|
793
|
+
peerId,
|
|
794
|
+
err
|
|
795
|
+
});
|
|
796
|
+
this.markAuthHandshakeFailed(peerId);
|
|
797
|
+
this.markPeerForDisconnect(peerId);
|
|
798
|
+
}
|
|
799
|
+
}
|
|
800
|
+
/*
|
|
801
|
+
* Marks when peer fails auth handshake
|
|
802
|
+
* */ markAuthHandshakeFailed(peerId) {
|
|
803
|
+
const now = this.dateProvider.now();
|
|
804
|
+
const peerIdStr = peerId.toString();
|
|
805
|
+
const existingEntry = this.failedAuthHandshakes.get(peerIdStr);
|
|
806
|
+
this.failedAuthHandshakes.set(peerIdStr, {
|
|
807
|
+
count: (existingEntry?.count || 0) + 1,
|
|
808
|
+
lastFailureTimestamp: now
|
|
809
|
+
});
|
|
810
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
811
|
+
connections.forEach((conn)=>{
|
|
812
|
+
// We mark the IP address
|
|
813
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
814
|
+
const existingAddressEntry = this.failedAuthHandshakes.get(address);
|
|
815
|
+
this.failedAuthHandshakes.set(address, {
|
|
816
|
+
count: (existingAddressEntry?.count || 0) + 1,
|
|
817
|
+
lastFailureTimestamp: now
|
|
818
|
+
});
|
|
819
|
+
});
|
|
820
|
+
}
|
|
821
|
+
/*
|
|
822
|
+
* Marks when peer exchanges auth handshake
|
|
823
|
+
* Removes any failed previous attempts
|
|
824
|
+
* */ markAuthHandshakeSuccess(peerId) {
|
|
825
|
+
this.failedAuthHandshakes.delete(peerId.toString());
|
|
826
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
827
|
+
connections.forEach((conn)=>{
|
|
828
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
829
|
+
this.failedAuthHandshakes.delete(address);
|
|
830
|
+
});
|
|
831
|
+
}
|
|
395
832
|
/**
|
|
396
833
|
* Stops the peer manager.
|
|
397
834
|
* Removing all event listeners.
|
|
398
835
|
*/ async stop() {
|
|
399
836
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
400
|
-
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.
|
|
837
|
+
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
401
838
|
// Send goodbyes to all peers
|
|
402
839
|
await Promise.all(this.libP2PNode.getPeers().map((peer)=>this.goodbyeAndDisconnectPeer(peer, GoodByeReason.SHUTDOWN)));
|
|
403
|
-
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent);
|
|
404
|
-
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent);
|
|
840
|
+
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
841
|
+
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
842
|
+
}
|
|
843
|
+
shouldTrustWithIdentity(peerId) {
|
|
844
|
+
return this.isProtectedPeer(peerId);
|
|
845
|
+
}
|
|
846
|
+
/**
|
|
847
|
+
* Performs auth request verification from peer. An auth request is valid if requested by an authorized peer (a peer we trust).
|
|
848
|
+
*
|
|
849
|
+
* @param: _authRequest - Auth request (unused)
|
|
850
|
+
* @param: peerId - The ID of the peer that requested the auth handshake
|
|
851
|
+
*
|
|
852
|
+
* @returns: StatusMessage if peer is trusted
|
|
853
|
+
*
|
|
854
|
+
* @throws: If peer is unauthorized
|
|
855
|
+
* */ async handleAuthRequestFromPeer(_authRequest, peerId) {
|
|
856
|
+
if (!this.shouldTrustWithIdentity(peerId)) {
|
|
857
|
+
this.logger.warn(`Received auth request from untrusted peer ${peerId.toString()}`);
|
|
858
|
+
throw new Error('Unauthorised');
|
|
859
|
+
}
|
|
860
|
+
this.logger.debug(`Received auth request from trusted peer ${peerId.toString()}`);
|
|
861
|
+
return await this.createStatusMessage();
|
|
862
|
+
}
|
|
863
|
+
async updateAuthenticatedPeers() {
|
|
864
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
865
|
+
const validatorSet = new Set(registeredValidators.map((v)=>v.toString()));
|
|
866
|
+
const peersToDelete = new Set();
|
|
867
|
+
const addressesToDelete = new Set();
|
|
868
|
+
for (const [peer, address] of this.authenticatedPeerIdToValidatorAddress.entries()){
|
|
869
|
+
const addressString = address.toString();
|
|
870
|
+
if (!validatorSet.has(addressString)) {
|
|
871
|
+
peersToDelete.add(peer);
|
|
872
|
+
addressesToDelete.add(addressString);
|
|
873
|
+
this.logger.info(`Removing authentication for peer ${peer.toString()} at address ${addressString} due to no longer being a registered validator`);
|
|
874
|
+
}
|
|
875
|
+
}
|
|
876
|
+
for (const peer of peersToDelete){
|
|
877
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peer);
|
|
878
|
+
}
|
|
879
|
+
for (const address of addressesToDelete){
|
|
880
|
+
this.authenticatedValidatorAddressToPeerId.delete(address);
|
|
881
|
+
}
|
|
405
882
|
}
|
|
406
883
|
}
|
|
407
884
|
_ts_decorate([
|