@aztec/p2p 0.0.0-test.1 → 0.0.1-commit.24de95ac
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bootstrap/bootstrap.d.ts.map +1 -1
- package/dest/bootstrap/bootstrap.js +22 -9
- package/dest/client/factory.d.ts +13 -3
- package/dest/client/factory.d.ts.map +1 -1
- package/dest/client/factory.js +60 -24
- package/dest/client/index.d.ts +1 -0
- package/dest/client/index.d.ts.map +1 -1
- package/dest/client/index.js +1 -0
- package/dest/client/interface.d.ts +155 -0
- package/dest/client/interface.d.ts.map +1 -0
- package/dest/client/interface.js +9 -0
- package/dest/client/p2p_client.d.ts +72 -169
- package/dest/client/p2p_client.d.ts.map +1 -1
- package/dest/client/p2p_client.js +365 -174
- package/dest/config.d.ts +123 -103
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +173 -34
- package/dest/enr/generate-enr.d.ts +10 -2
- package/dest/enr/generate-enr.d.ts.map +1 -1
- package/dest/enr/generate-enr.js +27 -5
- package/dest/index.d.ts +3 -0
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +2 -0
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +42 -4
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +204 -54
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +10 -2
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +93 -15
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts +10 -2
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.js +86 -18
- package/dest/mem_pools/attestation_pool/mocks.d.ts +1 -2
- package/dest/mem_pools/attestation_pool/mocks.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/mocks.js +9 -15
- package/dest/mem_pools/instrumentation.d.ts +7 -11
- package/dest/mem_pools/instrumentation.d.ts.map +1 -1
- package/dest/mem_pools/instrumentation.js +25 -37
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts +93 -9
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.js +469 -97
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts +33 -9
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.js +133 -36
- package/dest/mem_pools/tx_pool/priority.js +1 -1
- package/dest/mem_pools/tx_pool/tx_pool.d.ts +64 -8
- package/dest/mem_pools/tx_pool/tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.js +264 -39
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +1 -0
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/attestation_validator.js +45 -9
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +5 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +61 -12
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts +10 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts.map +1 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.js +36 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts +3 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.js +27 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts +14 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/archive_cache.js +22 -0
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/block_header_validator.js +4 -4
- package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/data_validator.js +56 -86
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts +0 -2
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/double_spend_validator.js +21 -27
- package/dest/msg_validators/tx_validator/factory.d.ts +15 -0
- package/dest/msg_validators/tx_validator/factory.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/factory.js +74 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts +11 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/gas_validator.js +115 -0
- package/dest/msg_validators/tx_validator/index.d.ts +7 -0
- package/dest/msg_validators/tx_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/index.js +7 -0
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts +7 -3
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/metadata_validator.js +39 -20
- package/dest/msg_validators/tx_validator/phases_validator.d.ts +14 -0
- package/dest/msg_validators/tx_validator/phases_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/phases_validator.js +91 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts +17 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/test_utils.js +22 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts +12 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.js +32 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts +8 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.js +24 -0
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.js +6 -5
- package/dest/services/discv5/discV5_service.d.ts +9 -8
- package/dest/services/discv5/discV5_service.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.js +63 -36
- package/dest/services/dummy_service.d.ts +49 -10
- package/dest/services/dummy_service.d.ts.map +1 -1
- package/dest/services/dummy_service.js +88 -5
- package/dest/services/encoding.d.ts +25 -6
- package/dest/services/encoding.d.ts.map +1 -1
- package/dest/services/encoding.js +73 -5
- package/dest/services/index.d.ts +4 -0
- package/dest/services/index.d.ts.map +1 -1
- package/dest/services/index.js +4 -0
- package/dest/services/libp2p/instrumentation.d.ts +18 -0
- package/dest/services/libp2p/instrumentation.d.ts.map +1 -0
- package/dest/services/libp2p/instrumentation.js +157 -0
- package/dest/services/libp2p/libp2p_service.d.ts +87 -42
- package/dest/services/libp2p/libp2p_service.d.ts.map +1 -1
- package/dest/services/libp2p/libp2p_service.js +500 -218
- package/dest/services/peer-manager/interface.d.ts +23 -0
- package/dest/services/peer-manager/interface.d.ts.map +1 -0
- package/dest/services/peer-manager/interface.js +1 -0
- package/dest/services/peer-manager/metrics.d.ts +3 -1
- package/dest/services/peer-manager/metrics.d.ts.map +1 -1
- package/dest/services/peer-manager/metrics.js +11 -2
- package/dest/services/peer-manager/peer_manager.d.ts +126 -15
- package/dest/services/peer-manager/peer_manager.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_manager.js +547 -72
- package/dest/services/reqresp/config.d.ts +10 -8
- package/dest/services/reqresp/config.d.ts.map +1 -1
- package/dest/services/reqresp/config.js +18 -4
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.js +10 -6
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts +30 -13
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/connection_sampler.js +142 -84
- package/dest/services/reqresp/index.d.ts +2 -1
- package/dest/services/reqresp/index.d.ts.map +1 -1
- package/dest/services/reqresp/index.js +2 -1
- package/dest/services/reqresp/interface.d.ts +72 -23
- package/dest/services/reqresp/interface.d.ts.map +1 -1
- package/dest/services/reqresp/interface.js +45 -26
- package/dest/services/reqresp/metrics.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/auth.d.ts +43 -0
- package/dest/services/reqresp/protocols/auth.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/auth.js +71 -0
- package/dest/services/reqresp/protocols/block.d.ts +5 -0
- package/dest/services/reqresp/protocols/block.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/block.js +28 -5
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts +30 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts +11 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.js +39 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts +49 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts +4 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/index.js +3 -0
- package/dest/services/reqresp/protocols/goodbye.d.ts +2 -4
- package/dest/services/reqresp/protocols/goodbye.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/goodbye.js +7 -7
- package/dest/services/reqresp/protocols/index.d.ts +2 -0
- package/dest/services/reqresp/protocols/index.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/index.js +2 -0
- package/dest/services/reqresp/protocols/ping.d.ts +0 -2
- package/dest/services/reqresp/protocols/ping.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.d.ts +38 -6
- package/dest/services/reqresp/protocols/status.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.js +72 -5
- package/dest/services/reqresp/protocols/tx.d.ts +12 -1
- package/dest/services/reqresp/protocols/tx.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/tx.js +34 -6
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts +4 -2
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.js +10 -2
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.js +21 -1
- package/dest/services/reqresp/reqresp.d.ts +45 -47
- package/dest/services/reqresp/reqresp.d.ts.map +1 -1
- package/dest/services/reqresp/reqresp.js +298 -207
- package/dest/services/reqresp/status.d.ts +9 -3
- package/dest/services/reqresp/status.d.ts.map +1 -1
- package/dest/services/reqresp/status.js +9 -2
- package/dest/services/service.d.ts +22 -18
- package/dest/services/service.d.ts.map +1 -1
- package/dest/services/tx_collection/config.d.ts +25 -0
- package/dest/services/tx_collection/config.d.ts.map +1 -0
- package/dest/services/tx_collection/config.js +58 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts +56 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/fast_tx_collection.js +300 -0
- package/dest/services/tx_collection/index.d.ts +3 -0
- package/dest/services/tx_collection/index.d.ts.map +1 -0
- package/dest/services/tx_collection/index.js +2 -0
- package/dest/services/tx_collection/instrumentation.d.ts +10 -0
- package/dest/services/tx_collection/instrumentation.d.ts.map +1 -0
- package/dest/services/tx_collection/instrumentation.js +34 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts +54 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/slow_tx_collection.js +176 -0
- package/dest/services/tx_collection/tx_collection.d.ts +110 -0
- package/dest/services/tx_collection/tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection.js +128 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts +30 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection_sink.js +111 -0
- package/dest/services/tx_collection/tx_source.d.ts +18 -0
- package/dest/services/tx_collection/tx_source.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_source.js +31 -0
- package/dest/services/tx_provider.d.ts +49 -0
- package/dest/services/tx_provider.d.ts.map +1 -0
- package/dest/services/tx_provider.js +210 -0
- package/dest/services/tx_provider_instrumentation.d.ts +13 -0
- package/dest/services/tx_provider_instrumentation.d.ts.map +1 -0
- package/dest/services/tx_provider_instrumentation.js +34 -0
- package/dest/test-helpers/get-ports.d.ts.map +1 -1
- package/dest/test-helpers/index.d.ts +1 -0
- package/dest/test-helpers/index.d.ts.map +1 -1
- package/dest/test-helpers/index.js +1 -0
- package/dest/test-helpers/make-enrs.d.ts.map +1 -1
- package/dest/test-helpers/make-enrs.js +4 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts +32 -4
- package/dest/test-helpers/make-test-p2p-clients.d.ts.map +1 -1
- package/dest/test-helpers/make-test-p2p-clients.js +86 -16
- package/dest/test-helpers/mock-pubsub.d.ts +59 -0
- package/dest/test-helpers/mock-pubsub.d.ts.map +1 -0
- package/dest/test-helpers/mock-pubsub.js +130 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts +12 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts.map +1 -0
- package/dest/test-helpers/mock-tx-helpers.js +19 -0
- package/dest/test-helpers/reqresp-nodes.d.ts +14 -10
- package/dest/test-helpers/reqresp-nodes.d.ts.map +1 -1
- package/dest/test-helpers/reqresp-nodes.js +62 -28
- package/dest/testbench/p2p_client_testbench_worker.js +96 -25
- package/dest/testbench/parse_log_file.js +4 -4
- package/dest/testbench/testbench.js +4 -4
- package/dest/testbench/worker_client_manager.d.ts +0 -5
- package/dest/testbench/worker_client_manager.d.ts.map +1 -1
- package/dest/testbench/worker_client_manager.js +11 -19
- package/dest/types/index.d.ts +3 -1
- package/dest/types/index.d.ts.map +1 -1
- package/dest/types/index.js +2 -0
- package/dest/util.d.ts +22 -15
- package/dest/util.d.ts.map +1 -1
- package/dest/util.js +64 -67
- package/dest/versioning.d.ts +3 -3
- package/dest/versioning.d.ts.map +1 -1
- package/dest/versioning.js +8 -3
- package/package.json +28 -24
- package/src/bootstrap/bootstrap.ts +27 -11
- package/src/client/factory.ts +136 -45
- package/src/client/index.ts +1 -0
- package/src/client/interface.ts +195 -0
- package/src/client/p2p_client.ts +460 -327
- package/src/config.ts +288 -134
- package/src/enr/generate-enr.ts +39 -6
- package/src/index.ts +4 -0
- package/src/mem_pools/attestation_pool/attestation_pool.ts +48 -4
- package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +241 -55
- package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +117 -20
- package/src/mem_pools/attestation_pool/memory_attestation_pool.ts +114 -22
- package/src/mem_pools/attestation_pool/mocks.ts +11 -10
- package/src/mem_pools/instrumentation.ts +32 -46
- package/src/mem_pools/tx_pool/aztec_kv_tx_pool.ts +549 -108
- package/src/mem_pools/tx_pool/memory_tx_pool.ts +153 -44
- package/src/mem_pools/tx_pool/priority.ts +1 -1
- package/src/mem_pools/tx_pool/tx_pool.ts +67 -8
- package/src/mem_pools/tx_pool/tx_pool_test_suite.ts +217 -34
- package/src/msg_validators/attestation_validator/attestation_validator.ts +55 -10
- package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +66 -14
- package/src/msg_validators/msg_seen_validator/msg_seen_validator.ts +36 -0
- package/src/msg_validators/tx_validator/allowed_public_setup.ts +35 -0
- package/src/msg_validators/tx_validator/archive_cache.ts +28 -0
- package/src/msg_validators/tx_validator/block_header_validator.ts +4 -4
- package/src/msg_validators/tx_validator/data_validator.ts +81 -69
- package/src/msg_validators/tx_validator/double_spend_validator.ts +19 -17
- package/src/msg_validators/tx_validator/factory.ts +109 -0
- package/src/msg_validators/tx_validator/gas_validator.ts +134 -0
- package/src/msg_validators/tx_validator/index.ts +7 -0
- package/src/msg_validators/tx_validator/metadata_validator.ts +58 -21
- package/src/msg_validators/tx_validator/phases_validator.ts +114 -0
- package/src/msg_validators/tx_validator/test_utils.ts +43 -0
- package/src/msg_validators/tx_validator/timestamp_validator.ts +46 -0
- package/src/msg_validators/tx_validator/tx_permitted_validator.ts +17 -0
- package/src/msg_validators/tx_validator/tx_proof_validator.ts +6 -5
- package/src/services/discv5/discV5_service.ts +84 -38
- package/src/services/dummy_service.ts +147 -9
- package/src/services/encoding.ts +80 -5
- package/src/services/index.ts +4 -0
- package/src/services/libp2p/instrumentation.ts +158 -0
- package/src/services/libp2p/libp2p_service.ts +646 -263
- package/src/services/peer-manager/interface.ts +29 -0
- package/src/services/peer-manager/metrics.ts +16 -1
- package/src/services/peer-manager/peer_manager.ts +652 -78
- package/src/services/reqresp/config.ts +26 -9
- package/src/services/reqresp/connection-sampler/batch_connection_sampler.ts +12 -6
- package/src/services/reqresp/connection-sampler/connection_sampler.ts +148 -95
- package/src/services/reqresp/index.ts +2 -0
- package/src/services/reqresp/interface.ts +91 -36
- package/src/services/reqresp/metrics.ts +4 -1
- package/src/services/reqresp/protocols/auth.ts +83 -0
- package/src/services/reqresp/protocols/block.ts +24 -3
- package/src/services/reqresp/protocols/block_txs/bitvector.ts +90 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_handler.ts +53 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_reqresp.ts +79 -0
- package/src/services/reqresp/protocols/block_txs/index.ts +3 -0
- package/src/services/reqresp/protocols/goodbye.ts +9 -7
- package/src/services/reqresp/protocols/index.ts +2 -0
- package/src/services/reqresp/protocols/status.ts +117 -5
- package/src/services/reqresp/protocols/tx.ts +35 -6
- package/src/services/reqresp/rate-limiter/rate_limiter.ts +12 -3
- package/src/services/reqresp/rate-limiter/rate_limits.ts +21 -1
- package/src/services/reqresp/reqresp.ts +387 -256
- package/src/services/reqresp/status.ts +12 -3
- package/src/services/service.ts +45 -21
- package/src/services/tx_collection/config.ts +84 -0
- package/src/services/tx_collection/fast_tx_collection.ts +340 -0
- package/src/services/tx_collection/index.ts +2 -0
- package/src/services/tx_collection/instrumentation.ts +43 -0
- package/src/services/tx_collection/slow_tx_collection.ts +232 -0
- package/src/services/tx_collection/tx_collection.ts +215 -0
- package/src/services/tx_collection/tx_collection_sink.ts +129 -0
- package/src/services/tx_collection/tx_source.ts +37 -0
- package/src/services/tx_provider.ts +216 -0
- package/src/services/tx_provider_instrumentation.ts +44 -0
- package/src/test-helpers/index.ts +1 -0
- package/src/test-helpers/make-enrs.ts +4 -5
- package/src/test-helpers/make-test-p2p-clients.ts +111 -21
- package/src/test-helpers/mock-pubsub.ts +188 -0
- package/src/test-helpers/mock-tx-helpers.ts +24 -0
- package/src/test-helpers/reqresp-nodes.ts +86 -35
- package/src/testbench/p2p_client_testbench_worker.ts +145 -22
- package/src/testbench/parse_log_file.ts +4 -4
- package/src/testbench/testbench.ts +4 -4
- package/src/testbench/worker_client_manager.ts +17 -23
- package/src/types/index.ts +2 -0
- package/src/util.ts +93 -89
- package/src/versioning.ts +11 -4
|
@@ -4,18 +4,29 @@ function _ts_decorate(decorators, target, key, desc) {
|
|
|
4
4
|
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
5
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
6
|
}
|
|
7
|
+
import { makeEthSignDigest, tryRecoverAddress } from '@aztec/foundation/crypto';
|
|
8
|
+
import { Fr } from '@aztec/foundation/fields';
|
|
7
9
|
import { createLogger } from '@aztec/foundation/log';
|
|
10
|
+
import { bufferToHex } from '@aztec/foundation/string';
|
|
11
|
+
import { DateProvider } from '@aztec/foundation/timer';
|
|
8
12
|
import { trackSpan } from '@aztec/telemetry-client';
|
|
13
|
+
import { peerIdFromString } from '@libp2p/peer-id';
|
|
14
|
+
import { ENR } from '@nethermindeth/enr';
|
|
9
15
|
import { inspect } from 'util';
|
|
10
16
|
import { PeerEvent } from '../../types/index.js';
|
|
11
17
|
import { ReqRespSubProtocol } from '../reqresp/interface.js';
|
|
18
|
+
import { AuthRequest, AuthResponse } from '../reqresp/protocols/auth.js';
|
|
12
19
|
import { GoodByeReason, prettyGoodbyeReason } from '../reqresp/protocols/goodbye.js';
|
|
20
|
+
import { StatusMessage } from '../reqresp/protocols/status.js';
|
|
21
|
+
import { ReqRespStatus } from '../reqresp/status.js';
|
|
13
22
|
import { PeerManagerMetrics } from './metrics.js';
|
|
14
23
|
import { PeerScoreState } from './peer_scoring.js';
|
|
15
24
|
const MAX_DIAL_ATTEMPTS = 3;
|
|
16
25
|
const MAX_CACHED_PEERS = 100;
|
|
17
26
|
const MAX_CACHED_PEER_AGE_MS = 5 * 60 * 1000; // 5 minutes
|
|
18
27
|
const FAILED_PEER_BAN_TIME_MS = 5 * 60 * 1000; // 5 minutes timeout after failing MAX_DIAL_ATTEMPTS
|
|
28
|
+
const GOODBYE_DIAL_TIMEOUT_MS = 1000;
|
|
29
|
+
const FAILED_AUTH_HANDSHAKE_EXPIRY_MS = 60 * 60 * 1000; // 1 hour
|
|
19
30
|
export class PeerManager {
|
|
20
31
|
libP2PNode;
|
|
21
32
|
peerDiscoveryService;
|
|
@@ -23,44 +34,150 @@ export class PeerManager {
|
|
|
23
34
|
logger;
|
|
24
35
|
peerScoring;
|
|
25
36
|
reqresp;
|
|
37
|
+
worldStateSynchronizer;
|
|
38
|
+
protocolVersion;
|
|
39
|
+
epochCache;
|
|
40
|
+
dateProvider;
|
|
26
41
|
cachedPeers;
|
|
27
42
|
heartbeatCounter;
|
|
28
43
|
displayPeerCountsPeerHeartbeat;
|
|
29
44
|
timedOutPeers;
|
|
45
|
+
trustedPeers;
|
|
46
|
+
trustedPeersInitialized;
|
|
47
|
+
privatePeers;
|
|
48
|
+
privatePeersInitialized;
|
|
49
|
+
preferredPeers;
|
|
50
|
+
authenticatedPeerIdToValidatorAddress;
|
|
51
|
+
authenticatedValidatorAddressToPeerId;
|
|
52
|
+
peersToBeDisconnected;
|
|
53
|
+
failedAuthHandshakes;
|
|
54
|
+
validatorAddresses;
|
|
55
|
+
initializedPreferredPeers;
|
|
30
56
|
metrics;
|
|
31
|
-
|
|
32
|
-
constructor(libP2PNode, peerDiscoveryService, config, telemetryClient, logger = createLogger('p2p:peer-manager'), peerScoring, reqresp){
|
|
57
|
+
handlers;
|
|
58
|
+
constructor(libP2PNode, peerDiscoveryService, config, telemetryClient, logger = createLogger('p2p:peer-manager'), peerScoring, reqresp, worldStateSynchronizer, protocolVersion, epochCache, dateProvider = new DateProvider()){
|
|
33
59
|
this.libP2PNode = libP2PNode;
|
|
34
60
|
this.peerDiscoveryService = peerDiscoveryService;
|
|
35
61
|
this.config = config;
|
|
36
62
|
this.logger = logger;
|
|
37
63
|
this.peerScoring = peerScoring;
|
|
38
64
|
this.reqresp = reqresp;
|
|
65
|
+
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
66
|
+
this.protocolVersion = protocolVersion;
|
|
67
|
+
this.epochCache = epochCache;
|
|
68
|
+
this.dateProvider = dateProvider;
|
|
39
69
|
this.cachedPeers = new Map();
|
|
40
70
|
this.heartbeatCounter = 0;
|
|
41
71
|
this.displayPeerCountsPeerHeartbeat = 0;
|
|
42
72
|
this.timedOutPeers = new Map();
|
|
73
|
+
this.trustedPeers = new Set();
|
|
74
|
+
this.trustedPeersInitialized = false;
|
|
75
|
+
this.privatePeers = new Set();
|
|
76
|
+
this.privatePeersInitialized = false;
|
|
77
|
+
this.preferredPeers = new Set();
|
|
78
|
+
this.authenticatedPeerIdToValidatorAddress = new Map();
|
|
79
|
+
this.authenticatedValidatorAddressToPeerId = new Map();
|
|
80
|
+
this.peersToBeDisconnected = new Set();
|
|
81
|
+
this.failedAuthHandshakes = new Map();
|
|
82
|
+
this.validatorAddresses = [];
|
|
83
|
+
this.initializedPreferredPeers = false;
|
|
84
|
+
if (this.config.p2pDisableStatusHandshake && this.config.p2pAllowOnlyValidators) {
|
|
85
|
+
throw new Error('Status handshake disabled but is required to allow only validators to connect.');
|
|
86
|
+
}
|
|
43
87
|
this.metrics = new PeerManagerMetrics(telemetryClient, 'PeerManager');
|
|
88
|
+
// Handle Discovered peers
|
|
89
|
+
this.handlers = {
|
|
90
|
+
handleConnectedPeerEvent: this.handleConnectedPeerEvent.bind(this),
|
|
91
|
+
handleDisconnectedPeerEvent: this.handleDisconnectedPeerEvent.bind(this),
|
|
92
|
+
handleDiscoveredPeer: (enr)=>this.handleDiscoveredPeer(enr).catch((e)=>this.logger.error('Error handling discovered peer', e))
|
|
93
|
+
};
|
|
44
94
|
// Handle new established connections
|
|
45
|
-
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent
|
|
95
|
+
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
46
96
|
// Handle lost connections
|
|
47
|
-
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent
|
|
48
|
-
// Handle Discovered peers
|
|
49
|
-
this.discoveredPeerHandler = (enr)=>this.handleDiscoveredPeer(enr).catch((e)=>this.logger.error('Error handling discovered peer', e));
|
|
97
|
+
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
50
98
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
51
|
-
this.peerDiscoveryService
|
|
99
|
+
this.peerDiscoveryService?.on(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
52
100
|
// Display peer counts every 60 seconds
|
|
53
101
|
this.displayPeerCountsPeerHeartbeat = Math.floor(60_000 / this.config.peerCheckIntervalMS);
|
|
54
102
|
}
|
|
103
|
+
/**
|
|
104
|
+
* Initializes the trusted peers.
|
|
105
|
+
*
|
|
106
|
+
* This function is called when the peer manager is initialized.
|
|
107
|
+
*/ async initializePeers() {
|
|
108
|
+
if (this.config.trustedPeers) {
|
|
109
|
+
const trustedPeersEnrs = this.config.trustedPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
110
|
+
await Promise.all(trustedPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.trustedPeers.add(peerId.toString()))).finally(()=>{
|
|
111
|
+
this.trustedPeersInitialized = true;
|
|
112
|
+
}).catch((e)=>this.logger.error('Error initializing trusted peers', e));
|
|
113
|
+
}
|
|
114
|
+
if (this.config.privatePeers) {
|
|
115
|
+
const privatePeersEnrs = this.config.privatePeers.map((enr)=>ENR.decodeTxt(enr));
|
|
116
|
+
await Promise.all(privatePeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>{
|
|
117
|
+
this.trustedPeers.add(peerId.toString());
|
|
118
|
+
this.privatePeers.add(peerId.toString());
|
|
119
|
+
})).finally(()=>{
|
|
120
|
+
if (!this.config.trustedPeers) {
|
|
121
|
+
this.trustedPeersInitialized = true;
|
|
122
|
+
}
|
|
123
|
+
this.privatePeersInitialized = true;
|
|
124
|
+
}).catch((e)=>this.logger.error('Error initializing private peers', e));
|
|
125
|
+
}
|
|
126
|
+
if (this.config.preferredPeers) {
|
|
127
|
+
const preferredPeersEnrs = this.config.preferredPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
128
|
+
await Promise.all(preferredPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.preferredPeers.add(peerId.toString()))).catch((e)=>this.logger.error('Error initializing preferred peers', e));
|
|
129
|
+
}
|
|
130
|
+
}
|
|
55
131
|
get tracer() {
|
|
56
132
|
return this.metrics.tracer;
|
|
57
133
|
}
|
|
58
|
-
heartbeat() {
|
|
134
|
+
async heartbeat() {
|
|
59
135
|
this.heartbeatCounter++;
|
|
60
136
|
this.peerScoring.decayAllScores();
|
|
61
137
|
this.cleanupExpiredTimeouts();
|
|
138
|
+
await this.setupDirectPeersIfValidator();
|
|
139
|
+
await this.updateAuthenticatedPeers();
|
|
140
|
+
await this.processScheduledDisconnects();
|
|
62
141
|
this.discover();
|
|
63
142
|
}
|
|
143
|
+
/*
|
|
144
|
+
* If this node is connecting to preferred peers, make sure it is registered validator */ async setupDirectPeersIfValidator() {
|
|
145
|
+
if (!this.config.preferredPeers) {
|
|
146
|
+
return;
|
|
147
|
+
}
|
|
148
|
+
// Already initialized preferred peers, don't wastefully repeat the same work
|
|
149
|
+
if (this.initializedPreferredPeers) {
|
|
150
|
+
return;
|
|
151
|
+
}
|
|
152
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
153
|
+
const validatorSet = new Set(registeredValidators.map((v)=>v.toString()));
|
|
154
|
+
const isThisNodePartOfValidatorSet = this.validatorAddresses.some((v)=>validatorSet.has(v.toString()));
|
|
155
|
+
if (!isThisNodePartOfValidatorSet) {
|
|
156
|
+
return;
|
|
157
|
+
}
|
|
158
|
+
const preferredPeersEnrs = this.config.preferredPeers.map((enr)=>ENR.decodeTxt(enr));
|
|
159
|
+
await Promise.all(preferredPeersEnrs.map((enr)=>enr.peerId())).then((peerIds)=>peerIds.forEach((peerId)=>this.preferredPeers.add(peerId.toString()))).catch((e)=>this.logger.error('Error initializing preferred peers', e));
|
|
160
|
+
const directPeers = (await Promise.all(preferredPeersEnrs.map(async (enr)=>{
|
|
161
|
+
const peerId = await enr.peerId();
|
|
162
|
+
const address = enr.getLocationMultiaddr('tcp');
|
|
163
|
+
if (address === undefined) {
|
|
164
|
+
throw new Error(`Direct peer ${peerId.toString()} has no TCP address, ENR: ${enr.encodeTxt()}`);
|
|
165
|
+
}
|
|
166
|
+
return {
|
|
167
|
+
id: peerId,
|
|
168
|
+
addrs: [
|
|
169
|
+
address
|
|
170
|
+
]
|
|
171
|
+
};
|
|
172
|
+
}))).filter((peer)=>peer !== undefined);
|
|
173
|
+
await Promise.all(directPeers.map((peer)=>{
|
|
174
|
+
this.libP2PNode.services.pubsub.direct.add(peer.id.toString());
|
|
175
|
+
return this.libP2PNode.peerStore.merge(peer.id, {
|
|
176
|
+
multiaddrs: peer.addrs
|
|
177
|
+
});
|
|
178
|
+
}));
|
|
179
|
+
this.initializedPreferredPeers = true;
|
|
180
|
+
}
|
|
64
181
|
/**
|
|
65
182
|
* Cleans up expired timeouts.
|
|
66
183
|
*
|
|
@@ -69,7 +186,7 @@ export class PeerManager {
|
|
|
69
186
|
* To give them a chance to reconnect.
|
|
70
187
|
*/ cleanupExpiredTimeouts() {
|
|
71
188
|
// Clean up expired timeouts
|
|
72
|
-
const now =
|
|
189
|
+
const now = this.dateProvider.now();
|
|
73
190
|
for (const [peerId, timedOutPeer] of this.timedOutPeers.entries()){
|
|
74
191
|
if (now >= timedOutPeer.timeoutUntilMs) {
|
|
75
192
|
this.timedOutPeers.delete(peerId);
|
|
@@ -77,26 +194,133 @@ export class PeerManager {
|
|
|
77
194
|
}
|
|
78
195
|
}
|
|
79
196
|
/**
|
|
80
|
-
*
|
|
197
|
+
* Processes scheduled disconnects during heartbeat.
|
|
198
|
+
*
|
|
199
|
+
* This batch processes all peers that have been marked for disconnect.
|
|
200
|
+
* preventing immediate disconnects that could cause libp2p state corruption.
|
|
201
|
+
*/ async processScheduledDisconnects() {
|
|
202
|
+
if (this.peersToBeDisconnected.size === 0) {
|
|
203
|
+
return;
|
|
204
|
+
}
|
|
205
|
+
const peersToDisconnect = Array.from(this.peersToBeDisconnected);
|
|
206
|
+
this.logger.debug(`Processing ${peersToDisconnect.length} scheduled disconnects`);
|
|
207
|
+
try {
|
|
208
|
+
await Promise.all(peersToDisconnect.map(async (peerIdStr)=>{
|
|
209
|
+
if (await this.disconnectPeer(peerIdFromString(peerIdStr))) {
|
|
210
|
+
this.peersToBeDisconnected.delete(peerIdStr);
|
|
211
|
+
}
|
|
212
|
+
}));
|
|
213
|
+
this.logger.verbose(`Disconnected ${peersToDisconnect.length} peers`, {
|
|
214
|
+
peersToDisconnect
|
|
215
|
+
});
|
|
216
|
+
} catch (error) {
|
|
217
|
+
this.logger.error('Error when disconnecting from peers', error);
|
|
218
|
+
}
|
|
219
|
+
}
|
|
220
|
+
/**
|
|
221
|
+
* Performs Status Handshake with a connected peer.
|
|
81
222
|
* @param e - The connected peer event.
|
|
82
223
|
*/ handleConnectedPeerEvent(e) {
|
|
83
224
|
const peerId = e.detail;
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
225
|
+
this.logger.verbose(`Connected to peer ${peerId.toString()}`);
|
|
226
|
+
if (this.config.p2pDisableStatusHandshake) {
|
|
227
|
+
return;
|
|
228
|
+
}
|
|
229
|
+
// If we are not configured to only allow validators then perform a status handshake
|
|
230
|
+
if (!this.config.p2pAllowOnlyValidators) {
|
|
231
|
+
void this.exchangeStatusHandshake(peerId);
|
|
232
|
+
return;
|
|
88
233
|
}
|
|
234
|
+
// We are configured to only allow validators, but this doesn't apply to trusted, private peers or preferred peers
|
|
235
|
+
if (this.isProtectedPeer(peerId)) {
|
|
236
|
+
void this.exchangeStatusHandshake(peerId);
|
|
237
|
+
return;
|
|
238
|
+
}
|
|
239
|
+
// Initiate auth handshake
|
|
240
|
+
void this.exchangeAuthHandshake(peerId);
|
|
89
241
|
}
|
|
90
242
|
/**
|
|
91
243
|
* Simply logs the type of disconnected peer.
|
|
92
244
|
* @param e - The disconnected peer event.
|
|
93
245
|
*/ handleDisconnectedPeerEvent(e) {
|
|
94
246
|
const peerId = e.detail;
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
this.logger.
|
|
247
|
+
this.logger.verbose(`Disconnected from peer ${peerId.toString()}`);
|
|
248
|
+
const validatorAddress = this.authenticatedPeerIdToValidatorAddress.get(peerId.toString());
|
|
249
|
+
if (validatorAddress !== undefined) {
|
|
250
|
+
this.logger.info(`Removing authentication for validator ${validatorAddress} at peer id ${peerId.toString()} due to disconnection`);
|
|
251
|
+
this.authenticatedValidatorAddressToPeerId.delete(validatorAddress.toString());
|
|
252
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peerId.toString());
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
registerThisValidatorAddresses(address) {
|
|
256
|
+
this.validatorAddresses = [
|
|
257
|
+
...address
|
|
258
|
+
];
|
|
259
|
+
}
|
|
260
|
+
/**
|
|
261
|
+
* Checks if a peer is trusted.
|
|
262
|
+
* @param peerId - The peer ID.
|
|
263
|
+
* @returns True if the peer is trusted, false otherwise.
|
|
264
|
+
* Note: This function will return false and log a warning if the trusted peers are not initialized.
|
|
265
|
+
*/ isTrustedPeer(peerId) {
|
|
266
|
+
if (!this.trustedPeersInitialized) {
|
|
267
|
+
this.logger.warn('Trusted peers not initialized, returning false');
|
|
268
|
+
return false;
|
|
99
269
|
}
|
|
270
|
+
return this.trustedPeers.has(peerId.toString());
|
|
271
|
+
}
|
|
272
|
+
/**
|
|
273
|
+
* Adds a peer to the trusted peers set.
|
|
274
|
+
* @param peerId - The peer ID to add to trusted peers.
|
|
275
|
+
*/ addTrustedPeer(peerId) {
|
|
276
|
+
const peerIdStr = peerId.toString();
|
|
277
|
+
this.trustedPeers.add(peerIdStr);
|
|
278
|
+
this.trustedPeersInitialized = true;
|
|
279
|
+
this.logger.verbose(`Added trusted peer ${peerIdStr}`);
|
|
280
|
+
}
|
|
281
|
+
/**
|
|
282
|
+
* Adds a peer to the private peers set.
|
|
283
|
+
* @param peerId - The peer ID to add to private peers.
|
|
284
|
+
*/ addPrivatePeer(peerId) {
|
|
285
|
+
const peerIdStr = peerId.toString();
|
|
286
|
+
this.trustedPeers.add(peerIdStr);
|
|
287
|
+
this.privatePeers.add(peerIdStr);
|
|
288
|
+
this.trustedPeersInitialized = true;
|
|
289
|
+
this.privatePeersInitialized = true;
|
|
290
|
+
this.logger.verbose(`Added private peer ${peerIdStr}`);
|
|
291
|
+
}
|
|
292
|
+
/**
|
|
293
|
+
* Checks if a peer is private.
|
|
294
|
+
* @param peerId - The peer ID.
|
|
295
|
+
* @returns True if the peer is private, false otherwise.
|
|
296
|
+
*/ isPrivatePeer(peerId) {
|
|
297
|
+
if (!this.privatePeersInitialized) {
|
|
298
|
+
this.logger.warn('Private peers not initialized, returning false');
|
|
299
|
+
return false;
|
|
300
|
+
}
|
|
301
|
+
return this.privatePeers.has(peerId.toString());
|
|
302
|
+
}
|
|
303
|
+
/**
|
|
304
|
+
* Adds a peer to the preferred peers set.
|
|
305
|
+
* @param peerId - The peer ID to add to preferred peers.
|
|
306
|
+
*/ addPreferredPeer(peerId) {
|
|
307
|
+
const peerIdStr = peerId.toString();
|
|
308
|
+
this.preferredPeers.add(peerIdStr);
|
|
309
|
+
this.logger.verbose(`Added preferred peer ${peerIdStr}`);
|
|
310
|
+
}
|
|
311
|
+
/**
|
|
312
|
+
* Checks if a peer is preferred.
|
|
313
|
+
* @param peerId - The peer ID.
|
|
314
|
+
* @returns True if the peer is preferred, false otherwise.
|
|
315
|
+
*/ isPreferredPeer(peerId) {
|
|
316
|
+
return this.preferredPeers.has(peerId.toString());
|
|
317
|
+
}
|
|
318
|
+
/**
|
|
319
|
+
* Checks if a peer is protected (either trusted or private).
|
|
320
|
+
* @param peerId - The peer ID.
|
|
321
|
+
* @returns True if the peer is protected, false otherwise.
|
|
322
|
+
*/ isProtectedPeer(peerId) {
|
|
323
|
+
return this.isTrustedPeer(peerId) || this.isPrivatePeer(peerId) || this.isPreferredPeer(peerId);
|
|
100
324
|
}
|
|
101
325
|
/**
|
|
102
326
|
* Handles a goodbye received from a peer.
|
|
@@ -107,7 +331,7 @@ export class PeerManager {
|
|
|
107
331
|
*/ goodbyeReceived(peerId, reason) {
|
|
108
332
|
this.logger.debug(`Goodbye received from peer ${peerId.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
109
333
|
this.metrics.recordGoodbyeReceived(reason);
|
|
110
|
-
|
|
334
|
+
this.markPeerForDisconnect(peerId);
|
|
111
335
|
}
|
|
112
336
|
penalizePeer(peerId, penalty) {
|
|
113
337
|
this.peerScoring.penalizePeer(peerId, penalty);
|
|
@@ -115,6 +339,10 @@ export class PeerManager {
|
|
|
115
339
|
getPeerScore(peerId) {
|
|
116
340
|
return this.peerScoring.getScore(peerId);
|
|
117
341
|
}
|
|
342
|
+
shouldDisableP2PGossip(peerId) {
|
|
343
|
+
const isAuthenticated = this.isAuthenticatedPeer(peerIdFromString(peerId));
|
|
344
|
+
return (this.config.p2pAllowOnlyValidators ?? false) && !isAuthenticated;
|
|
345
|
+
}
|
|
118
346
|
getPeers(includePending = false) {
|
|
119
347
|
const connected = this.libP2PNode.getPeers().map((peer)=>({
|
|
120
348
|
id: peer.toString(),
|
|
@@ -145,30 +373,56 @@ export class PeerManager {
|
|
|
145
373
|
...cachedPeers
|
|
146
374
|
];
|
|
147
375
|
}
|
|
376
|
+
isAuthenticatedPeer(peerId) {
|
|
377
|
+
const peerIdAsString = peerId.toString();
|
|
378
|
+
return this.privatePeers.has(peerIdAsString) || this.trustedPeers.has(peerIdAsString) || this.preferredPeers.has(peerIdAsString) || this.authenticatedPeerIdToValidatorAddress.has(peerIdAsString);
|
|
379
|
+
}
|
|
380
|
+
/*
|
|
381
|
+
* Checks whether peer is allowed to connect
|
|
382
|
+
*
|
|
383
|
+
* @param id: Address of the node or it's peerId
|
|
384
|
+
*
|
|
385
|
+
* @returns: True if node is allowed to connect, otherwise false
|
|
386
|
+
* */ isNodeAllowedToConnect(id) {
|
|
387
|
+
const entry = this.failedAuthHandshakes.get(id.toString());
|
|
388
|
+
if (!entry) {
|
|
389
|
+
return true;
|
|
390
|
+
}
|
|
391
|
+
// In case entry is too old, remove it and allow connection
|
|
392
|
+
if (this.dateProvider.now() - entry.lastFailureTimestamp > FAILED_AUTH_HANDSHAKE_EXPIRY_MS) {
|
|
393
|
+
this.failedAuthHandshakes.delete(id.toString());
|
|
394
|
+
return true;
|
|
395
|
+
}
|
|
396
|
+
return entry.count <= this.config.p2pMaxFailedAuthAttemptsAllowed;
|
|
397
|
+
}
|
|
148
398
|
/**
|
|
149
399
|
* Discovers peers.
|
|
150
400
|
*/ discover() {
|
|
151
401
|
const connections = this.libP2PNode.getConnections();
|
|
152
|
-
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.
|
|
402
|
+
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.getNonProtectedPeers(connections)));
|
|
153
403
|
// Calculate how many connections we're looking to make
|
|
154
|
-
const
|
|
404
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
405
|
+
const peersToConnect = this.config.maxPeerCount - healthyConnections.length - protectedPeerCount;
|
|
155
406
|
const logLevel = this.heartbeatCounter % this.displayPeerCountsPeerHeartbeat === 0 ? 'info' : 'debug';
|
|
156
|
-
this.logger[logLevel](`Connected to ${healthyConnections.length} peers`, {
|
|
157
|
-
|
|
407
|
+
this.logger[logLevel](`Connected to ${healthyConnections.length + this.trustedPeers.size} peers`, {
|
|
408
|
+
discoveredConnections: healthyConnections.length,
|
|
409
|
+
protectedConnections: protectedPeerCount,
|
|
158
410
|
maxPeerCount: this.config.maxPeerCount,
|
|
159
411
|
cachedPeers: this.cachedPeers.size,
|
|
160
412
|
...this.peerScoring.getStats()
|
|
161
413
|
});
|
|
414
|
+
this.metrics.recordPeerCount(healthyConnections.length);
|
|
162
415
|
// Exit if no peers to connect
|
|
163
416
|
if (peersToConnect <= 0) {
|
|
164
417
|
return;
|
|
165
418
|
}
|
|
166
419
|
const cachedPeersToDial = [];
|
|
167
420
|
const pendingDials = new Set(this.libP2PNode.getDialQueue().map((pendingDial)=>pendingDial.peerId?.toString()).filter(Boolean));
|
|
421
|
+
const now = this.dateProvider.now();
|
|
168
422
|
for (const [id, peerData] of this.cachedPeers.entries()){
|
|
169
423
|
// if already dialling or connected to, remove from cache
|
|
170
424
|
if (pendingDials.has(id) || healthyConnections.some((conn)=>conn.remotePeer.equals(peerData.peerId)) || // if peer has been in cache for the max cache age, remove from cache
|
|
171
|
-
|
|
425
|
+
now - peerData.addedUnixMs > MAX_CACHED_PEER_AGE_MS) {
|
|
172
426
|
this.cachedPeers.delete(id);
|
|
173
427
|
} else {
|
|
174
428
|
// cachedPeersToDial.set(id, enr);
|
|
@@ -188,6 +442,12 @@ export class PeerManager {
|
|
|
188
442
|
void this.peerDiscoveryService.runRandomNodesQuery();
|
|
189
443
|
}
|
|
190
444
|
}
|
|
445
|
+
getNonProtectedPeers(connections) {
|
|
446
|
+
return connections.filter((conn)=>!this.isProtectedPeer(conn.remotePeer));
|
|
447
|
+
}
|
|
448
|
+
getProtectedPeerCount() {
|
|
449
|
+
return this.trustedPeers.size + this.privatePeers.size + this.preferredPeers.size;
|
|
450
|
+
}
|
|
191
451
|
pruneUnhealthyPeers(connections) {
|
|
192
452
|
const connectedHealthyPeers = [];
|
|
193
453
|
for (const peer of connections){
|
|
@@ -211,72 +471,69 @@ export class PeerManager {
|
|
|
211
471
|
* @param connections - The list of connections to prune low scoring peers above the max peer count from.
|
|
212
472
|
* @returns The pruned list of connections.
|
|
213
473
|
*/ prioritizePeers(connections) {
|
|
214
|
-
|
|
215
|
-
|
|
474
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
475
|
+
if (connections.length > this.config.maxPeerCount - protectedPeerCount) {
|
|
476
|
+
// Sort the regular peer scores from highest to lowest
|
|
216
477
|
const prioritizedConnections = connections.sort((connectionA, connectionB)=>{
|
|
217
478
|
const connectionScoreA = this.peerScoring.getScore(connectionA.remotePeer.toString());
|
|
218
479
|
const connectionScoreB = this.peerScoring.getScore(connectionB.remotePeer.toString());
|
|
219
480
|
return connectionScoreB - connectionScoreA;
|
|
220
481
|
});
|
|
221
|
-
//
|
|
222
|
-
|
|
482
|
+
// Calculate how many regular peers we can keep
|
|
483
|
+
const peersToKeep = Math.max(0, this.config.maxPeerCount - protectedPeerCount);
|
|
484
|
+
// Disconnect from the lowest scoring regular connections that exceed our limit
|
|
485
|
+
for (const conn of prioritizedConnections.slice(peersToKeep)){
|
|
223
486
|
void this.goodbyeAndDisconnectPeer(conn.remotePeer, GoodByeReason.MAX_PEERS);
|
|
224
487
|
}
|
|
225
|
-
|
|
488
|
+
// Return trusted connections plus the highest scoring regular connections up to the max peer count
|
|
489
|
+
return prioritizedConnections.slice(0, peersToKeep);
|
|
226
490
|
} else {
|
|
227
491
|
return connections;
|
|
228
492
|
}
|
|
229
493
|
}
|
|
230
|
-
/**
|
|
231
|
-
* If multiple connections to the same peer are found, the oldest connection is kept and the duplicates are pruned.
|
|
232
|
-
*
|
|
233
|
-
* This is necessary to resolve a race condition where multiple connections to the same peer are established if
|
|
234
|
-
* they are discovered at the same time.
|
|
235
|
-
*
|
|
236
|
-
* @param connections - The list of connections to prune duplicate peers from.
|
|
237
|
-
* @returns The pruned list of connections.
|
|
238
|
-
*/ pruneDuplicatePeers(connections) {
|
|
239
|
-
const peerConnections = new Map();
|
|
240
|
-
for (const conn of connections){
|
|
241
|
-
const peerId = conn.remotePeer.toString();
|
|
242
|
-
const existingConnection = peerConnections.get(peerId);
|
|
243
|
-
if (!existingConnection) {
|
|
244
|
-
peerConnections.set(peerId, conn);
|
|
245
|
-
} else {
|
|
246
|
-
// Keep the oldest connection for each peer
|
|
247
|
-
this.logger.debug(`Found duplicate connection to peer ${peerId}, keeping oldest connection`);
|
|
248
|
-
if (conn.timeline.open < existingConnection.timeline.open) {
|
|
249
|
-
peerConnections.set(peerId, conn);
|
|
250
|
-
void existingConnection.close();
|
|
251
|
-
} else {
|
|
252
|
-
void conn.close();
|
|
253
|
-
}
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
return [
|
|
257
|
-
...peerConnections.values()
|
|
258
|
-
];
|
|
259
|
-
}
|
|
260
494
|
async goodbyeAndDisconnectPeer(peer, reason) {
|
|
261
495
|
this.logger.debug(`Disconnecting peer ${peer.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
262
496
|
this.metrics.recordGoodbyeSent(reason);
|
|
263
497
|
try {
|
|
264
|
-
await this.reqresp.sendRequestToPeer(peer, ReqRespSubProtocol.GOODBYE, Buffer.from([
|
|
498
|
+
const resp = await this.reqresp.sendRequestToPeer(peer, ReqRespSubProtocol.GOODBYE, Buffer.from([
|
|
265
499
|
reason
|
|
266
|
-
]));
|
|
500
|
+
]), GOODBYE_DIAL_TIMEOUT_MS);
|
|
501
|
+
if (resp.status === ReqRespStatus.FAILURE) {
|
|
502
|
+
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}`);
|
|
503
|
+
} else if (resp.status === ReqRespStatus.SUCCESS) {
|
|
504
|
+
this.logger.verbose(`Sent goodbye to peer ${peer.toString()}`);
|
|
505
|
+
} else {
|
|
506
|
+
this.logger.debug(`Unexpected status sending goodbye to peer ${peer.toString()}: ${ReqRespStatus[resp.status]}`);
|
|
507
|
+
}
|
|
267
508
|
} catch (error) {
|
|
268
509
|
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}: ${error}`);
|
|
269
510
|
} finally{
|
|
270
|
-
|
|
511
|
+
this.markPeerForDisconnect(peer);
|
|
271
512
|
}
|
|
272
513
|
}
|
|
273
|
-
|
|
514
|
+
/*
|
|
515
|
+
* Marks peer to be disconnected on the next heartbeat
|
|
516
|
+
* */ markPeerForDisconnect(peer) {
|
|
517
|
+
const peerIdStr = peer.toString();
|
|
518
|
+
this.logger.debug(`Scheduling peer ${peerIdStr} for disconnection`);
|
|
519
|
+
this.peersToBeDisconnected.add(peerIdStr);
|
|
520
|
+
}
|
|
521
|
+
/**
|
|
522
|
+
* Performs the actual disconnection of a peer.
|
|
523
|
+
* This is called during heartbeat processing to avoid immediate disconnections.
|
|
524
|
+
*
|
|
525
|
+
* @returns True if peer was disconnect, otherwise false
|
|
526
|
+
*/ async disconnectPeer(peer) {
|
|
527
|
+
const peerIdStr = peer.toString();
|
|
274
528
|
try {
|
|
275
529
|
await this.libP2PNode.hangUp(peer);
|
|
530
|
+
this.logger.debug(`Successfully disconnected peer ${peerIdStr}`);
|
|
531
|
+
return true;
|
|
276
532
|
} catch (error) {
|
|
277
|
-
this.logger.
|
|
278
|
-
error
|
|
533
|
+
this.logger.warn(`Failed to disconnect peer ${peerIdStr}`, {
|
|
534
|
+
error
|
|
279
535
|
});
|
|
536
|
+
return false;
|
|
280
537
|
}
|
|
281
538
|
}
|
|
282
539
|
/**
|
|
@@ -286,10 +543,15 @@ export class PeerManager {
|
|
|
286
543
|
// Check that the peer has not already been banned
|
|
287
544
|
const peerId = await enr.peerId();
|
|
288
545
|
const peerIdString = peerId.toString();
|
|
546
|
+
// Don't attempt to connect to peers scheduled for disconnection
|
|
547
|
+
if (this.peersToBeDisconnected.has(peerIdString)) {
|
|
548
|
+
this.logger.trace(`Skipping peer scheduled for disconnection ${peerId}`);
|
|
549
|
+
return;
|
|
550
|
+
}
|
|
289
551
|
// Check if peer is temporarily timed out
|
|
290
552
|
const timedOutPeer = this.timedOutPeers.get(peerIdString);
|
|
291
553
|
if (timedOutPeer) {
|
|
292
|
-
if (
|
|
554
|
+
if (this.dateProvider.now() < timedOutPeer.timeoutUntilMs) {
|
|
293
555
|
this.logger.trace(`Skipping timed out peer ${peerId}`);
|
|
294
556
|
return;
|
|
295
557
|
}
|
|
@@ -325,7 +587,7 @@ export class PeerManager {
|
|
|
325
587
|
enr,
|
|
326
588
|
multiaddrTcp,
|
|
327
589
|
dialAttempts: 0,
|
|
328
|
-
addedUnixMs:
|
|
590
|
+
addedUnixMs: this.dateProvider.now()
|
|
329
591
|
};
|
|
330
592
|
// Determine if we should dial immediately or not
|
|
331
593
|
if (this.shouldDialPeer()) {
|
|
@@ -364,7 +626,7 @@ export class PeerManager {
|
|
|
364
626
|
// Add to timed out peers
|
|
365
627
|
this.timedOutPeers.set(id, {
|
|
366
628
|
peerId: id,
|
|
367
|
-
timeoutUntilMs:
|
|
629
|
+
timeoutUntilMs: this.dateProvider.now() + FAILED_PEER_BAN_TIME_MS
|
|
368
630
|
});
|
|
369
631
|
}
|
|
370
632
|
}
|
|
@@ -383,7 +645,11 @@ export class PeerManager {
|
|
|
383
645
|
return;
|
|
384
646
|
}
|
|
385
647
|
// Remove the oldest peers
|
|
386
|
-
for (const key of this.cachedPeers.
|
|
648
|
+
for (const [key, value] of this.cachedPeers.entries()){
|
|
649
|
+
if (this.isProtectedPeer(value.peerId)) {
|
|
650
|
+
this.logger.debug(`Not pruning trusted peer ${key}`);
|
|
651
|
+
continue;
|
|
652
|
+
}
|
|
387
653
|
this.cachedPeers.delete(key);
|
|
388
654
|
this.logger.trace(`Pruning peer ${key} from cache`);
|
|
389
655
|
peersToDelete--;
|
|
@@ -392,16 +658,225 @@ export class PeerManager {
|
|
|
392
658
|
}
|
|
393
659
|
}
|
|
394
660
|
}
|
|
661
|
+
async createStatusMessage() {
|
|
662
|
+
const syncSummary = (await this.worldStateSynchronizer.status()).syncSummary;
|
|
663
|
+
return StatusMessage.fromWorldStateSyncStatus(this.protocolVersion, syncSummary);
|
|
664
|
+
}
|
|
665
|
+
/**
|
|
666
|
+
* Performs status Handshake with the Peer
|
|
667
|
+
* The way the protocol is designed is that each peer will call this method on newly established p2p connection.
|
|
668
|
+
* Both peers request Status message and both peers perform validation of the received Status message.
|
|
669
|
+
* If this validation fails on any end that peer will initiate disconnect.
|
|
670
|
+
* Note: It's important for both peers to request and perform Status validation,
|
|
671
|
+
* Because one of the peers can be _bad peer_ and this peer can simply skip the check.
|
|
672
|
+
* If we don't implement validation on both ends the _bad peer_ remains connected.
|
|
673
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
674
|
+
* */ async exchangeStatusHandshake(peerId) {
|
|
675
|
+
try {
|
|
676
|
+
const ourStatus = await this.createStatusMessage();
|
|
677
|
+
//Note: Technically we don't have to send out status to peer as well, but we do.
|
|
678
|
+
//It will be easier to update protocol in the future this way if need be.
|
|
679
|
+
this.logger.trace(`Initiating status handshake with peer ${peerId}`);
|
|
680
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.STATUS, ourStatus.toBuffer());
|
|
681
|
+
const { status } = response;
|
|
682
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
683
|
+
//TODO: maybe hard ban these peers in the future.
|
|
684
|
+
//We could allow this to happen up to N times, and then hard ban?
|
|
685
|
+
//Hard ban: Disallow connection via e.g. libp2p's Gater
|
|
686
|
+
this.logger.debug(`Disconnecting peer ${peerId} who failed to respond status handshake`, {
|
|
687
|
+
peerId,
|
|
688
|
+
status: ReqRespStatus[status]
|
|
689
|
+
});
|
|
690
|
+
this.markPeerForDisconnect(peerId);
|
|
691
|
+
return;
|
|
692
|
+
}
|
|
693
|
+
const { data } = response;
|
|
694
|
+
const logData = {
|
|
695
|
+
peerId,
|
|
696
|
+
status: ReqRespStatus[status],
|
|
697
|
+
data: data ? bufferToHex(data) : undefined
|
|
698
|
+
};
|
|
699
|
+
const peerStatusMessage = StatusMessage.fromBuffer(data);
|
|
700
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
701
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to failed status handshake.`, logData);
|
|
702
|
+
this.markPeerForDisconnect(peerId);
|
|
703
|
+
return;
|
|
704
|
+
}
|
|
705
|
+
this.logger.debug(`Successfully completed status handshake with peer ${peerId}`, logData);
|
|
706
|
+
} catch (err) {
|
|
707
|
+
//TODO: maybe hard ban these peers in the future
|
|
708
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to error during status handshake: ${err.message ?? err}`, {
|
|
709
|
+
peerId
|
|
710
|
+
});
|
|
711
|
+
this.markPeerForDisconnect(peerId);
|
|
712
|
+
}
|
|
713
|
+
}
|
|
714
|
+
/**
|
|
715
|
+
* Performs auth Handshake with the Peer
|
|
716
|
+
* A superset of the status handshake. Also includes a challenge that needs to be signed by the peer's validator key.
|
|
717
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
718
|
+
* */ async exchangeAuthHandshake(peerId) {
|
|
719
|
+
const peerIdString = peerId.toString();
|
|
720
|
+
try {
|
|
721
|
+
const ourStatus = await this.createStatusMessage();
|
|
722
|
+
const authRequest = new AuthRequest(ourStatus, Fr.random());
|
|
723
|
+
// Note: Technically we don't have to send our status to peer as well, but we do.
|
|
724
|
+
// It will be easier to update protocol in the future this way if need be.
|
|
725
|
+
// We also need to send the challenge at least, so that the peer can sign it.
|
|
726
|
+
this.logger.debug(`Initiating auth handshake with peer ${peerId}`);
|
|
727
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.AUTH, authRequest.toBuffer());
|
|
728
|
+
const { status } = response;
|
|
729
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
730
|
+
this.logger.verbose(`Disconnecting peer ${peerId} who failed to respond auth handshake`, {
|
|
731
|
+
peerId,
|
|
732
|
+
status: ReqRespStatus[status]
|
|
733
|
+
});
|
|
734
|
+
this.markAuthHandshakeFailed(peerId);
|
|
735
|
+
this.markPeerForDisconnect(peerId);
|
|
736
|
+
return;
|
|
737
|
+
}
|
|
738
|
+
const { data } = response;
|
|
739
|
+
const logData = {
|
|
740
|
+
peerId,
|
|
741
|
+
status: ReqRespStatus[status],
|
|
742
|
+
data: data ? bufferToHex(data) : undefined
|
|
743
|
+
};
|
|
744
|
+
const peerAuthResponse = AuthResponse.fromBuffer(data);
|
|
745
|
+
const peerStatusMessage = peerAuthResponse.status;
|
|
746
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
747
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed status handshake as part of auth.`, logData);
|
|
748
|
+
this.markAuthHandshakeFailed(peerId);
|
|
749
|
+
this.markPeerForDisconnect(peerId);
|
|
750
|
+
return;
|
|
751
|
+
}
|
|
752
|
+
const hashToRecover = authRequest.getPayloadToSign();
|
|
753
|
+
const ethSignedHash = makeEthSignDigest(hashToRecover);
|
|
754
|
+
const sender = tryRecoverAddress(ethSignedHash, peerAuthResponse.signature);
|
|
755
|
+
if (!sender) {
|
|
756
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, invalid signature.`, logData);
|
|
757
|
+
this.markAuthHandshakeFailed(peerId);
|
|
758
|
+
this.markPeerForDisconnect(peerId);
|
|
759
|
+
return;
|
|
760
|
+
}
|
|
761
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
762
|
+
const found = registeredValidators.find((v)=>v.toString() === sender.toString()) !== undefined;
|
|
763
|
+
if (!found) {
|
|
764
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, peer is not a registered validator.`, {
|
|
765
|
+
...logData,
|
|
766
|
+
address: sender.toString()
|
|
767
|
+
});
|
|
768
|
+
this.markAuthHandshakeFailed(peerId);
|
|
769
|
+
this.markPeerForDisconnect(peerId);
|
|
770
|
+
return;
|
|
771
|
+
}
|
|
772
|
+
// Check to see that this validator address isn't already allocated to a different peer
|
|
773
|
+
const peerForAddress = this.authenticatedValidatorAddressToPeerId.get(sender.toString());
|
|
774
|
+
if (peerForAddress !== undefined && peerForAddress.toString() !== peerIdString) {
|
|
775
|
+
this.logger.verbose(`Received auth for validator ${sender.toString()} from peer ${peerIdString}, but this validator is already authenticated to peer ${peerForAddress.toString()}`, {
|
|
776
|
+
...logData,
|
|
777
|
+
address: sender.toString()
|
|
778
|
+
});
|
|
779
|
+
return;
|
|
780
|
+
}
|
|
781
|
+
this.markAuthHandshakeSuccess(peerId);
|
|
782
|
+
this.authenticatedPeerIdToValidatorAddress.set(peerIdString, sender);
|
|
783
|
+
this.authenticatedValidatorAddressToPeerId.set(sender.toString(), peerId);
|
|
784
|
+
this.logger.info(`Successfully completed auth handshake with peer ${peerId}, validator address ${sender.toString()}`, {
|
|
785
|
+
...logData,
|
|
786
|
+
address: sender.toString()
|
|
787
|
+
});
|
|
788
|
+
} catch (err) {
|
|
789
|
+
//TODO: maybe hard ban these peers in the future
|
|
790
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to error during auth handshake: ${err.message}`, {
|
|
791
|
+
peerId,
|
|
792
|
+
err
|
|
793
|
+
});
|
|
794
|
+
this.markAuthHandshakeFailed(peerId);
|
|
795
|
+
this.markPeerForDisconnect(peerId);
|
|
796
|
+
}
|
|
797
|
+
}
|
|
798
|
+
/*
|
|
799
|
+
* Marks when peer fails auth handshake
|
|
800
|
+
* */ markAuthHandshakeFailed(peerId) {
|
|
801
|
+
const now = this.dateProvider.now();
|
|
802
|
+
const peerIdStr = peerId.toString();
|
|
803
|
+
const existingEntry = this.failedAuthHandshakes.get(peerIdStr);
|
|
804
|
+
this.failedAuthHandshakes.set(peerIdStr, {
|
|
805
|
+
count: (existingEntry?.count || 0) + 1,
|
|
806
|
+
lastFailureTimestamp: now
|
|
807
|
+
});
|
|
808
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
809
|
+
connections.forEach((conn)=>{
|
|
810
|
+
// We mark the IP address
|
|
811
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
812
|
+
const existingAddressEntry = this.failedAuthHandshakes.get(address);
|
|
813
|
+
this.failedAuthHandshakes.set(address, {
|
|
814
|
+
count: (existingAddressEntry?.count || 0) + 1,
|
|
815
|
+
lastFailureTimestamp: now
|
|
816
|
+
});
|
|
817
|
+
});
|
|
818
|
+
}
|
|
819
|
+
/*
|
|
820
|
+
* Marks when peer exchanges auth handshake
|
|
821
|
+
* Removes any failed previous attempts
|
|
822
|
+
* */ markAuthHandshakeSuccess(peerId) {
|
|
823
|
+
this.failedAuthHandshakes.delete(peerId.toString());
|
|
824
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
825
|
+
connections.forEach((conn)=>{
|
|
826
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
827
|
+
this.failedAuthHandshakes.delete(address);
|
|
828
|
+
});
|
|
829
|
+
}
|
|
395
830
|
/**
|
|
396
831
|
* Stops the peer manager.
|
|
397
832
|
* Removing all event listeners.
|
|
398
833
|
*/ async stop() {
|
|
399
834
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
400
|
-
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.
|
|
835
|
+
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
401
836
|
// Send goodbyes to all peers
|
|
402
837
|
await Promise.all(this.libP2PNode.getPeers().map((peer)=>this.goodbyeAndDisconnectPeer(peer, GoodByeReason.SHUTDOWN)));
|
|
403
|
-
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent);
|
|
404
|
-
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent);
|
|
838
|
+
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
839
|
+
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
840
|
+
}
|
|
841
|
+
shouldTrustWithIdentity(peerId) {
|
|
842
|
+
return this.isProtectedPeer(peerId);
|
|
843
|
+
}
|
|
844
|
+
/**
|
|
845
|
+
* Performs auth request verification from peer. An auth request is valid if requested by an authorized peer (a peer we trust).
|
|
846
|
+
*
|
|
847
|
+
* @param: _authRequest - Auth request (unused)
|
|
848
|
+
* @param: peerId - The ID of the peer that requested the auth handshake
|
|
849
|
+
*
|
|
850
|
+
* @returns: StatusMessage if peer is trusted
|
|
851
|
+
*
|
|
852
|
+
* @throws: If peer is unauthorized
|
|
853
|
+
* */ async handleAuthRequestFromPeer(_authRequest, peerId) {
|
|
854
|
+
if (!this.shouldTrustWithIdentity(peerId)) {
|
|
855
|
+
this.logger.warn(`Received auth request from untrusted peer ${peerId.toString()}`);
|
|
856
|
+
throw new Error('Unauthorised');
|
|
857
|
+
}
|
|
858
|
+
this.logger.debug(`Received auth request from trusted peer ${peerId.toString()}`);
|
|
859
|
+
return await this.createStatusMessage();
|
|
860
|
+
}
|
|
861
|
+
async updateAuthenticatedPeers() {
|
|
862
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
863
|
+
const validatorSet = new Set(registeredValidators.map((v)=>v.toString()));
|
|
864
|
+
const peersToDelete = new Set();
|
|
865
|
+
const addressesToDelete = new Set();
|
|
866
|
+
for (const [peer, address] of this.authenticatedPeerIdToValidatorAddress.entries()){
|
|
867
|
+
const addressString = address.toString();
|
|
868
|
+
if (!validatorSet.has(addressString)) {
|
|
869
|
+
peersToDelete.add(peer);
|
|
870
|
+
addressesToDelete.add(addressString);
|
|
871
|
+
this.logger.info(`Removing authentication for peer ${peer.toString()} at address ${addressString} due to no longer being a registered validator`);
|
|
872
|
+
}
|
|
873
|
+
}
|
|
874
|
+
for (const peer of peersToDelete){
|
|
875
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peer);
|
|
876
|
+
}
|
|
877
|
+
for (const address of addressesToDelete){
|
|
878
|
+
this.authenticatedValidatorAddressToPeerId.delete(address);
|
|
879
|
+
}
|
|
405
880
|
}
|
|
406
881
|
}
|
|
407
882
|
_ts_decorate([
|