@aztec/p2p 0.0.0-test.1 → 0.0.1-commit.24de95ac
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bootstrap/bootstrap.d.ts.map +1 -1
- package/dest/bootstrap/bootstrap.js +22 -9
- package/dest/client/factory.d.ts +13 -3
- package/dest/client/factory.d.ts.map +1 -1
- package/dest/client/factory.js +60 -24
- package/dest/client/index.d.ts +1 -0
- package/dest/client/index.d.ts.map +1 -1
- package/dest/client/index.js +1 -0
- package/dest/client/interface.d.ts +155 -0
- package/dest/client/interface.d.ts.map +1 -0
- package/dest/client/interface.js +9 -0
- package/dest/client/p2p_client.d.ts +72 -169
- package/dest/client/p2p_client.d.ts.map +1 -1
- package/dest/client/p2p_client.js +365 -174
- package/dest/config.d.ts +123 -103
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +173 -34
- package/dest/enr/generate-enr.d.ts +10 -2
- package/dest/enr/generate-enr.d.ts.map +1 -1
- package/dest/enr/generate-enr.js +27 -5
- package/dest/index.d.ts +3 -0
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +2 -0
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +42 -4
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +204 -54
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +10 -2
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +93 -15
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts +10 -2
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.js +86 -18
- package/dest/mem_pools/attestation_pool/mocks.d.ts +1 -2
- package/dest/mem_pools/attestation_pool/mocks.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/mocks.js +9 -15
- package/dest/mem_pools/instrumentation.d.ts +7 -11
- package/dest/mem_pools/instrumentation.d.ts.map +1 -1
- package/dest/mem_pools/instrumentation.js +25 -37
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts +93 -9
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.js +469 -97
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts +33 -9
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.js +133 -36
- package/dest/mem_pools/tx_pool/priority.js +1 -1
- package/dest/mem_pools/tx_pool/tx_pool.d.ts +64 -8
- package/dest/mem_pools/tx_pool/tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.js +264 -39
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +1 -0
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/attestation_validator.js +45 -9
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +5 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +61 -12
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts +10 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts.map +1 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.js +36 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts +3 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.js +27 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts +14 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/archive_cache.js +22 -0
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/block_header_validator.js +4 -4
- package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/data_validator.js +56 -86
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts +0 -2
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/double_spend_validator.js +21 -27
- package/dest/msg_validators/tx_validator/factory.d.ts +15 -0
- package/dest/msg_validators/tx_validator/factory.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/factory.js +74 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts +11 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/gas_validator.js +115 -0
- package/dest/msg_validators/tx_validator/index.d.ts +7 -0
- package/dest/msg_validators/tx_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/index.js +7 -0
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts +7 -3
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/metadata_validator.js +39 -20
- package/dest/msg_validators/tx_validator/phases_validator.d.ts +14 -0
- package/dest/msg_validators/tx_validator/phases_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/phases_validator.js +91 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts +17 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/test_utils.js +22 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts +12 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.js +32 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts +8 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.js +24 -0
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.js +6 -5
- package/dest/services/discv5/discV5_service.d.ts +9 -8
- package/dest/services/discv5/discV5_service.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.js +63 -36
- package/dest/services/dummy_service.d.ts +49 -10
- package/dest/services/dummy_service.d.ts.map +1 -1
- package/dest/services/dummy_service.js +88 -5
- package/dest/services/encoding.d.ts +25 -6
- package/dest/services/encoding.d.ts.map +1 -1
- package/dest/services/encoding.js +73 -5
- package/dest/services/index.d.ts +4 -0
- package/dest/services/index.d.ts.map +1 -1
- package/dest/services/index.js +4 -0
- package/dest/services/libp2p/instrumentation.d.ts +18 -0
- package/dest/services/libp2p/instrumentation.d.ts.map +1 -0
- package/dest/services/libp2p/instrumentation.js +157 -0
- package/dest/services/libp2p/libp2p_service.d.ts +87 -42
- package/dest/services/libp2p/libp2p_service.d.ts.map +1 -1
- package/dest/services/libp2p/libp2p_service.js +500 -218
- package/dest/services/peer-manager/interface.d.ts +23 -0
- package/dest/services/peer-manager/interface.d.ts.map +1 -0
- package/dest/services/peer-manager/interface.js +1 -0
- package/dest/services/peer-manager/metrics.d.ts +3 -1
- package/dest/services/peer-manager/metrics.d.ts.map +1 -1
- package/dest/services/peer-manager/metrics.js +11 -2
- package/dest/services/peer-manager/peer_manager.d.ts +126 -15
- package/dest/services/peer-manager/peer_manager.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_manager.js +547 -72
- package/dest/services/reqresp/config.d.ts +10 -8
- package/dest/services/reqresp/config.d.ts.map +1 -1
- package/dest/services/reqresp/config.js +18 -4
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.js +10 -6
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts +30 -13
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/connection_sampler.js +142 -84
- package/dest/services/reqresp/index.d.ts +2 -1
- package/dest/services/reqresp/index.d.ts.map +1 -1
- package/dest/services/reqresp/index.js +2 -1
- package/dest/services/reqresp/interface.d.ts +72 -23
- package/dest/services/reqresp/interface.d.ts.map +1 -1
- package/dest/services/reqresp/interface.js +45 -26
- package/dest/services/reqresp/metrics.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/auth.d.ts +43 -0
- package/dest/services/reqresp/protocols/auth.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/auth.js +71 -0
- package/dest/services/reqresp/protocols/block.d.ts +5 -0
- package/dest/services/reqresp/protocols/block.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/block.js +28 -5
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts +30 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts +11 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.js +39 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts +49 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts +4 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/index.js +3 -0
- package/dest/services/reqresp/protocols/goodbye.d.ts +2 -4
- package/dest/services/reqresp/protocols/goodbye.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/goodbye.js +7 -7
- package/dest/services/reqresp/protocols/index.d.ts +2 -0
- package/dest/services/reqresp/protocols/index.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/index.js +2 -0
- package/dest/services/reqresp/protocols/ping.d.ts +0 -2
- package/dest/services/reqresp/protocols/ping.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.d.ts +38 -6
- package/dest/services/reqresp/protocols/status.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.js +72 -5
- package/dest/services/reqresp/protocols/tx.d.ts +12 -1
- package/dest/services/reqresp/protocols/tx.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/tx.js +34 -6
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts +4 -2
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.js +10 -2
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.js +21 -1
- package/dest/services/reqresp/reqresp.d.ts +45 -47
- package/dest/services/reqresp/reqresp.d.ts.map +1 -1
- package/dest/services/reqresp/reqresp.js +298 -207
- package/dest/services/reqresp/status.d.ts +9 -3
- package/dest/services/reqresp/status.d.ts.map +1 -1
- package/dest/services/reqresp/status.js +9 -2
- package/dest/services/service.d.ts +22 -18
- package/dest/services/service.d.ts.map +1 -1
- package/dest/services/tx_collection/config.d.ts +25 -0
- package/dest/services/tx_collection/config.d.ts.map +1 -0
- package/dest/services/tx_collection/config.js +58 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts +56 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/fast_tx_collection.js +300 -0
- package/dest/services/tx_collection/index.d.ts +3 -0
- package/dest/services/tx_collection/index.d.ts.map +1 -0
- package/dest/services/tx_collection/index.js +2 -0
- package/dest/services/tx_collection/instrumentation.d.ts +10 -0
- package/dest/services/tx_collection/instrumentation.d.ts.map +1 -0
- package/dest/services/tx_collection/instrumentation.js +34 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts +54 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/slow_tx_collection.js +176 -0
- package/dest/services/tx_collection/tx_collection.d.ts +110 -0
- package/dest/services/tx_collection/tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection.js +128 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts +30 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection_sink.js +111 -0
- package/dest/services/tx_collection/tx_source.d.ts +18 -0
- package/dest/services/tx_collection/tx_source.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_source.js +31 -0
- package/dest/services/tx_provider.d.ts +49 -0
- package/dest/services/tx_provider.d.ts.map +1 -0
- package/dest/services/tx_provider.js +210 -0
- package/dest/services/tx_provider_instrumentation.d.ts +13 -0
- package/dest/services/tx_provider_instrumentation.d.ts.map +1 -0
- package/dest/services/tx_provider_instrumentation.js +34 -0
- package/dest/test-helpers/get-ports.d.ts.map +1 -1
- package/dest/test-helpers/index.d.ts +1 -0
- package/dest/test-helpers/index.d.ts.map +1 -1
- package/dest/test-helpers/index.js +1 -0
- package/dest/test-helpers/make-enrs.d.ts.map +1 -1
- package/dest/test-helpers/make-enrs.js +4 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts +32 -4
- package/dest/test-helpers/make-test-p2p-clients.d.ts.map +1 -1
- package/dest/test-helpers/make-test-p2p-clients.js +86 -16
- package/dest/test-helpers/mock-pubsub.d.ts +59 -0
- package/dest/test-helpers/mock-pubsub.d.ts.map +1 -0
- package/dest/test-helpers/mock-pubsub.js +130 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts +12 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts.map +1 -0
- package/dest/test-helpers/mock-tx-helpers.js +19 -0
- package/dest/test-helpers/reqresp-nodes.d.ts +14 -10
- package/dest/test-helpers/reqresp-nodes.d.ts.map +1 -1
- package/dest/test-helpers/reqresp-nodes.js +62 -28
- package/dest/testbench/p2p_client_testbench_worker.js +96 -25
- package/dest/testbench/parse_log_file.js +4 -4
- package/dest/testbench/testbench.js +4 -4
- package/dest/testbench/worker_client_manager.d.ts +0 -5
- package/dest/testbench/worker_client_manager.d.ts.map +1 -1
- package/dest/testbench/worker_client_manager.js +11 -19
- package/dest/types/index.d.ts +3 -1
- package/dest/types/index.d.ts.map +1 -1
- package/dest/types/index.js +2 -0
- package/dest/util.d.ts +22 -15
- package/dest/util.d.ts.map +1 -1
- package/dest/util.js +64 -67
- package/dest/versioning.d.ts +3 -3
- package/dest/versioning.d.ts.map +1 -1
- package/dest/versioning.js +8 -3
- package/package.json +28 -24
- package/src/bootstrap/bootstrap.ts +27 -11
- package/src/client/factory.ts +136 -45
- package/src/client/index.ts +1 -0
- package/src/client/interface.ts +195 -0
- package/src/client/p2p_client.ts +460 -327
- package/src/config.ts +288 -134
- package/src/enr/generate-enr.ts +39 -6
- package/src/index.ts +4 -0
- package/src/mem_pools/attestation_pool/attestation_pool.ts +48 -4
- package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +241 -55
- package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +117 -20
- package/src/mem_pools/attestation_pool/memory_attestation_pool.ts +114 -22
- package/src/mem_pools/attestation_pool/mocks.ts +11 -10
- package/src/mem_pools/instrumentation.ts +32 -46
- package/src/mem_pools/tx_pool/aztec_kv_tx_pool.ts +549 -108
- package/src/mem_pools/tx_pool/memory_tx_pool.ts +153 -44
- package/src/mem_pools/tx_pool/priority.ts +1 -1
- package/src/mem_pools/tx_pool/tx_pool.ts +67 -8
- package/src/mem_pools/tx_pool/tx_pool_test_suite.ts +217 -34
- package/src/msg_validators/attestation_validator/attestation_validator.ts +55 -10
- package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +66 -14
- package/src/msg_validators/msg_seen_validator/msg_seen_validator.ts +36 -0
- package/src/msg_validators/tx_validator/allowed_public_setup.ts +35 -0
- package/src/msg_validators/tx_validator/archive_cache.ts +28 -0
- package/src/msg_validators/tx_validator/block_header_validator.ts +4 -4
- package/src/msg_validators/tx_validator/data_validator.ts +81 -69
- package/src/msg_validators/tx_validator/double_spend_validator.ts +19 -17
- package/src/msg_validators/tx_validator/factory.ts +109 -0
- package/src/msg_validators/tx_validator/gas_validator.ts +134 -0
- package/src/msg_validators/tx_validator/index.ts +7 -0
- package/src/msg_validators/tx_validator/metadata_validator.ts +58 -21
- package/src/msg_validators/tx_validator/phases_validator.ts +114 -0
- package/src/msg_validators/tx_validator/test_utils.ts +43 -0
- package/src/msg_validators/tx_validator/timestamp_validator.ts +46 -0
- package/src/msg_validators/tx_validator/tx_permitted_validator.ts +17 -0
- package/src/msg_validators/tx_validator/tx_proof_validator.ts +6 -5
- package/src/services/discv5/discV5_service.ts +84 -38
- package/src/services/dummy_service.ts +147 -9
- package/src/services/encoding.ts +80 -5
- package/src/services/index.ts +4 -0
- package/src/services/libp2p/instrumentation.ts +158 -0
- package/src/services/libp2p/libp2p_service.ts +646 -263
- package/src/services/peer-manager/interface.ts +29 -0
- package/src/services/peer-manager/metrics.ts +16 -1
- package/src/services/peer-manager/peer_manager.ts +652 -78
- package/src/services/reqresp/config.ts +26 -9
- package/src/services/reqresp/connection-sampler/batch_connection_sampler.ts +12 -6
- package/src/services/reqresp/connection-sampler/connection_sampler.ts +148 -95
- package/src/services/reqresp/index.ts +2 -0
- package/src/services/reqresp/interface.ts +91 -36
- package/src/services/reqresp/metrics.ts +4 -1
- package/src/services/reqresp/protocols/auth.ts +83 -0
- package/src/services/reqresp/protocols/block.ts +24 -3
- package/src/services/reqresp/protocols/block_txs/bitvector.ts +90 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_handler.ts +53 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_reqresp.ts +79 -0
- package/src/services/reqresp/protocols/block_txs/index.ts +3 -0
- package/src/services/reqresp/protocols/goodbye.ts +9 -7
- package/src/services/reqresp/protocols/index.ts +2 -0
- package/src/services/reqresp/protocols/status.ts +117 -5
- package/src/services/reqresp/protocols/tx.ts +35 -6
- package/src/services/reqresp/rate-limiter/rate_limiter.ts +12 -3
- package/src/services/reqresp/rate-limiter/rate_limits.ts +21 -1
- package/src/services/reqresp/reqresp.ts +387 -256
- package/src/services/reqresp/status.ts +12 -3
- package/src/services/service.ts +45 -21
- package/src/services/tx_collection/config.ts +84 -0
- package/src/services/tx_collection/fast_tx_collection.ts +340 -0
- package/src/services/tx_collection/index.ts +2 -0
- package/src/services/tx_collection/instrumentation.ts +43 -0
- package/src/services/tx_collection/slow_tx_collection.ts +232 -0
- package/src/services/tx_collection/tx_collection.ts +215 -0
- package/src/services/tx_collection/tx_collection_sink.ts +129 -0
- package/src/services/tx_collection/tx_source.ts +37 -0
- package/src/services/tx_provider.ts +216 -0
- package/src/services/tx_provider_instrumentation.ts +44 -0
- package/src/test-helpers/index.ts +1 -0
- package/src/test-helpers/make-enrs.ts +4 -5
- package/src/test-helpers/make-test-p2p-clients.ts +111 -21
- package/src/test-helpers/mock-pubsub.ts +188 -0
- package/src/test-helpers/mock-tx-helpers.ts +24 -0
- package/src/test-helpers/reqresp-nodes.ts +86 -35
- package/src/testbench/p2p_client_testbench_worker.ts +145 -22
- package/src/testbench/parse_log_file.ts +4 -4
- package/src/testbench/testbench.ts +4 -4
- package/src/testbench/worker_client_manager.ts +17 -23
- package/src/types/index.ts +2 -0
- package/src/util.ts +93 -89
- package/src/versioning.ts +11 -4
|
@@ -1,20 +1,31 @@
|
|
|
1
|
+
import type { EpochCacheInterface } from '@aztec/epoch-cache';
|
|
2
|
+
import { makeEthSignDigest, tryRecoverAddress } from '@aztec/foundation/crypto';
|
|
3
|
+
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
4
|
+
import { Fr } from '@aztec/foundation/fields';
|
|
1
5
|
import { createLogger } from '@aztec/foundation/log';
|
|
2
|
-
import
|
|
6
|
+
import { bufferToHex } from '@aztec/foundation/string';
|
|
7
|
+
import { DateProvider } from '@aztec/foundation/timer';
|
|
8
|
+
import type { PeerInfo, WorldStateSynchronizer } from '@aztec/stdlib/interfaces/server';
|
|
3
9
|
import type { PeerErrorSeverity } from '@aztec/stdlib/p2p';
|
|
4
10
|
import { type TelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
5
11
|
|
|
6
|
-
import type { ENR } from '@chainsafe/enr';
|
|
7
12
|
import type { Connection, PeerId } from '@libp2p/interface';
|
|
13
|
+
import { peerIdFromString } from '@libp2p/peer-id';
|
|
8
14
|
import type { Multiaddr } from '@multiformats/multiaddr';
|
|
15
|
+
import { ENR } from '@nethermindeth/enr';
|
|
9
16
|
import { inspect } from 'util';
|
|
10
17
|
|
|
11
18
|
import type { P2PConfig } from '../../config.js';
|
|
12
19
|
import { PeerEvent } from '../../types/index.js';
|
|
13
|
-
import type {
|
|
20
|
+
import type { FullLibp2p } from '../../util.js';
|
|
14
21
|
import { ReqRespSubProtocol } from '../reqresp/interface.js';
|
|
22
|
+
import { AuthRequest, AuthResponse } from '../reqresp/protocols/auth.js';
|
|
15
23
|
import { GoodByeReason, prettyGoodbyeReason } from '../reqresp/protocols/goodbye.js';
|
|
24
|
+
import { StatusMessage } from '../reqresp/protocols/status.js';
|
|
16
25
|
import type { ReqResp } from '../reqresp/reqresp.js';
|
|
26
|
+
import { ReqRespStatus } from '../reqresp/status.js';
|
|
17
27
|
import type { PeerDiscoveryService } from '../service.js';
|
|
28
|
+
import type { PeerManagerInterface } from './interface.js';
|
|
18
29
|
import { PeerManagerMetrics } from './metrics.js';
|
|
19
30
|
import { PeerScoreState, type PeerScoring } from './peer_scoring.js';
|
|
20
31
|
|
|
@@ -22,6 +33,8 @@ const MAX_DIAL_ATTEMPTS = 3;
|
|
|
22
33
|
const MAX_CACHED_PEERS = 100;
|
|
23
34
|
const MAX_CACHED_PEER_AGE_MS = 5 * 60 * 1000; // 5 minutes
|
|
24
35
|
const FAILED_PEER_BAN_TIME_MS = 5 * 60 * 1000; // 5 minutes timeout after failing MAX_DIAL_ATTEMPTS
|
|
36
|
+
const GOODBYE_DIAL_TIMEOUT_MS = 1000;
|
|
37
|
+
const FAILED_AUTH_HANDSHAKE_EXPIRY_MS = 60 * 60 * 1000; // 1 hour
|
|
25
38
|
|
|
26
39
|
type CachedPeer = {
|
|
27
40
|
peerId: PeerId;
|
|
@@ -36,55 +49,183 @@ type TimedOutPeer = {
|
|
|
36
49
|
timeoutUntilMs: number;
|
|
37
50
|
};
|
|
38
51
|
|
|
39
|
-
|
|
52
|
+
type FailedAuthHandshakeEntry = {
|
|
53
|
+
count: number;
|
|
54
|
+
lastFailureTimestamp: number;
|
|
55
|
+
};
|
|
56
|
+
|
|
57
|
+
export class PeerManager implements PeerManagerInterface {
|
|
40
58
|
private cachedPeers: Map<string, CachedPeer> = new Map();
|
|
41
59
|
private heartbeatCounter: number = 0;
|
|
42
60
|
private displayPeerCountsPeerHeartbeat: number = 0;
|
|
43
61
|
private timedOutPeers: Map<string, TimedOutPeer> = new Map();
|
|
62
|
+
private trustedPeers: Set<string> = new Set();
|
|
63
|
+
private trustedPeersInitialized: boolean = false;
|
|
64
|
+
private privatePeers: Set<string> = new Set();
|
|
65
|
+
private privatePeersInitialized: boolean = false;
|
|
66
|
+
private preferredPeers: Set<string> = new Set();
|
|
67
|
+
private authenticatedPeerIdToValidatorAddress: Map<string, EthAddress> = new Map();
|
|
68
|
+
private authenticatedValidatorAddressToPeerId: Map<string, PeerId> = new Map();
|
|
69
|
+
private peersToBeDisconnected: Set<string> = new Set();
|
|
70
|
+
private failedAuthHandshakes: Map<string, FailedAuthHandshakeEntry> = new Map();
|
|
71
|
+
private validatorAddresses: EthAddress[] = [];
|
|
72
|
+
private initializedPreferredPeers: boolean = false;
|
|
44
73
|
|
|
45
74
|
private metrics: PeerManagerMetrics;
|
|
46
|
-
private
|
|
75
|
+
private handlers: {
|
|
76
|
+
handleConnectedPeerEvent: (e: CustomEvent<PeerId>) => void;
|
|
77
|
+
handleDisconnectedPeerEvent: (e: CustomEvent<PeerId>) => void;
|
|
78
|
+
handleDiscoveredPeer: (enr: ENR) => Promise<void>;
|
|
79
|
+
};
|
|
47
80
|
|
|
48
81
|
constructor(
|
|
49
|
-
private libP2PNode:
|
|
82
|
+
private libP2PNode: FullLibp2p,
|
|
50
83
|
private peerDiscoveryService: PeerDiscoveryService,
|
|
51
84
|
private config: P2PConfig,
|
|
52
85
|
telemetryClient: TelemetryClient,
|
|
53
86
|
private logger = createLogger('p2p:peer-manager'),
|
|
54
87
|
private peerScoring: PeerScoring,
|
|
55
88
|
private reqresp: ReqResp,
|
|
89
|
+
private readonly worldStateSynchronizer: WorldStateSynchronizer,
|
|
90
|
+
private readonly protocolVersion: string,
|
|
91
|
+
private readonly epochCache: EpochCacheInterface,
|
|
92
|
+
private readonly dateProvider: DateProvider = new DateProvider(),
|
|
56
93
|
) {
|
|
94
|
+
if (this.config.p2pDisableStatusHandshake && this.config.p2pAllowOnlyValidators) {
|
|
95
|
+
throw new Error('Status handshake disabled but is required to allow only validators to connect.');
|
|
96
|
+
}
|
|
57
97
|
this.metrics = new PeerManagerMetrics(telemetryClient, 'PeerManager');
|
|
58
98
|
|
|
99
|
+
// Handle Discovered peers
|
|
100
|
+
this.handlers = {
|
|
101
|
+
handleConnectedPeerEvent: this.handleConnectedPeerEvent.bind(this),
|
|
102
|
+
handleDisconnectedPeerEvent: this.handleDisconnectedPeerEvent.bind(this),
|
|
103
|
+
handleDiscoveredPeer: (enr: ENR) =>
|
|
104
|
+
this.handleDiscoveredPeer(enr).catch(e => this.logger.error('Error handling discovered peer', e)),
|
|
105
|
+
};
|
|
106
|
+
|
|
59
107
|
// Handle new established connections
|
|
60
|
-
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent
|
|
108
|
+
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
61
109
|
// Handle lost connections
|
|
62
|
-
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent
|
|
110
|
+
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
63
111
|
|
|
64
|
-
// Handle Discovered peers
|
|
65
|
-
this.discoveredPeerHandler = (enr: ENR) =>
|
|
66
|
-
this.handleDiscoveredPeer(enr).catch(e => this.logger.error('Error handling discovered peer', e));
|
|
67
112
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
68
|
-
this.peerDiscoveryService
|
|
113
|
+
this.peerDiscoveryService?.on(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
69
114
|
|
|
70
115
|
// Display peer counts every 60 seconds
|
|
71
116
|
this.displayPeerCountsPeerHeartbeat = Math.floor(60_000 / this.config.peerCheckIntervalMS);
|
|
72
117
|
}
|
|
118
|
+
/**
|
|
119
|
+
* Initializes the trusted peers.
|
|
120
|
+
*
|
|
121
|
+
* This function is called when the peer manager is initialized.
|
|
122
|
+
*/
|
|
123
|
+
async initializePeers() {
|
|
124
|
+
if (this.config.trustedPeers) {
|
|
125
|
+
const trustedPeersEnrs: ENR[] = this.config.trustedPeers.map(enr => ENR.decodeTxt(enr));
|
|
126
|
+
await Promise.all(trustedPeersEnrs.map(enr => enr.peerId()))
|
|
127
|
+
.then(peerIds => peerIds.forEach(peerId => this.trustedPeers.add(peerId.toString())))
|
|
128
|
+
.finally(() => {
|
|
129
|
+
this.trustedPeersInitialized = true;
|
|
130
|
+
})
|
|
131
|
+
.catch(e => this.logger.error('Error initializing trusted peers', e));
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
if (this.config.privatePeers) {
|
|
135
|
+
const privatePeersEnrs: ENR[] = this.config.privatePeers.map(enr => ENR.decodeTxt(enr));
|
|
136
|
+
await Promise.all(privatePeersEnrs.map(enr => enr.peerId()))
|
|
137
|
+
.then(peerIds =>
|
|
138
|
+
peerIds.forEach(peerId => {
|
|
139
|
+
this.trustedPeers.add(peerId.toString());
|
|
140
|
+
this.privatePeers.add(peerId.toString());
|
|
141
|
+
}),
|
|
142
|
+
)
|
|
143
|
+
.finally(() => {
|
|
144
|
+
if (!this.config.trustedPeers) {
|
|
145
|
+
this.trustedPeersInitialized = true;
|
|
146
|
+
}
|
|
147
|
+
this.privatePeersInitialized = true;
|
|
148
|
+
})
|
|
149
|
+
.catch(e => this.logger.error('Error initializing private peers', e));
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
if (this.config.preferredPeers) {
|
|
153
|
+
const preferredPeersEnrs: ENR[] = this.config.preferredPeers.map(enr => ENR.decodeTxt(enr));
|
|
154
|
+
await Promise.all(preferredPeersEnrs.map(enr => enr.peerId()))
|
|
155
|
+
.then(peerIds => peerIds.forEach(peerId => this.preferredPeers.add(peerId.toString())))
|
|
156
|
+
.catch(e => this.logger.error('Error initializing preferred peers', e));
|
|
157
|
+
}
|
|
158
|
+
}
|
|
73
159
|
|
|
74
160
|
get tracer() {
|
|
75
161
|
return this.metrics.tracer;
|
|
76
162
|
}
|
|
77
163
|
|
|
78
164
|
@trackSpan('PeerManager.heartbeat')
|
|
79
|
-
public heartbeat() {
|
|
165
|
+
public async heartbeat() {
|
|
80
166
|
this.heartbeatCounter++;
|
|
81
167
|
this.peerScoring.decayAllScores();
|
|
82
|
-
|
|
83
168
|
this.cleanupExpiredTimeouts();
|
|
84
169
|
|
|
170
|
+
await this.setupDirectPeersIfValidator();
|
|
171
|
+
await this.updateAuthenticatedPeers();
|
|
172
|
+
await this.processScheduledDisconnects();
|
|
173
|
+
|
|
85
174
|
this.discover();
|
|
86
175
|
}
|
|
87
176
|
|
|
177
|
+
/*
|
|
178
|
+
* If this node is connecting to preferred peers, make sure it is registered validator */
|
|
179
|
+
async setupDirectPeersIfValidator() {
|
|
180
|
+
if (!this.config.preferredPeers) {
|
|
181
|
+
return;
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
// Already initialized preferred peers, don't wastefully repeat the same work
|
|
185
|
+
if (this.initializedPreferredPeers) {
|
|
186
|
+
return;
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
190
|
+
const validatorSet = new Set(registeredValidators.map(v => v.toString()));
|
|
191
|
+
const isThisNodePartOfValidatorSet = this.validatorAddresses.some(v => validatorSet.has(v.toString()));
|
|
192
|
+
|
|
193
|
+
if (!isThisNodePartOfValidatorSet) {
|
|
194
|
+
return;
|
|
195
|
+
}
|
|
196
|
+
|
|
197
|
+
const preferredPeersEnrs: ENR[] = this.config.preferredPeers.map(enr => ENR.decodeTxt(enr));
|
|
198
|
+
await Promise.all(preferredPeersEnrs.map(enr => enr.peerId()))
|
|
199
|
+
.then(peerIds => peerIds.forEach(peerId => this.preferredPeers.add(peerId.toString())))
|
|
200
|
+
.catch(e => this.logger.error('Error initializing preferred peers', e));
|
|
201
|
+
|
|
202
|
+
const directPeers = (
|
|
203
|
+
await Promise.all(
|
|
204
|
+
preferredPeersEnrs.map(async enr => {
|
|
205
|
+
const peerId = await enr.peerId();
|
|
206
|
+
const address = enr.getLocationMultiaddr('tcp');
|
|
207
|
+
if (address === undefined) {
|
|
208
|
+
throw new Error(`Direct peer ${peerId.toString()} has no TCP address, ENR: ${enr.encodeTxt()}`);
|
|
209
|
+
}
|
|
210
|
+
return {
|
|
211
|
+
id: peerId,
|
|
212
|
+
addrs: [address],
|
|
213
|
+
};
|
|
214
|
+
}),
|
|
215
|
+
)
|
|
216
|
+
).filter(peer => peer !== undefined);
|
|
217
|
+
|
|
218
|
+
await Promise.all(
|
|
219
|
+
directPeers.map(peer => {
|
|
220
|
+
this.libP2PNode.services.pubsub.direct.add(peer.id.toString());
|
|
221
|
+
|
|
222
|
+
return this.libP2PNode.peerStore.merge(peer.id, { multiaddrs: peer.addrs });
|
|
223
|
+
}),
|
|
224
|
+
);
|
|
225
|
+
|
|
226
|
+
this.initializedPreferredPeers = true;
|
|
227
|
+
}
|
|
228
|
+
|
|
88
229
|
/**
|
|
89
230
|
* Cleans up expired timeouts.
|
|
90
231
|
*
|
|
@@ -94,7 +235,7 @@ export class PeerManager {
|
|
|
94
235
|
*/
|
|
95
236
|
private cleanupExpiredTimeouts() {
|
|
96
237
|
// Clean up expired timeouts
|
|
97
|
-
const now =
|
|
238
|
+
const now = this.dateProvider.now();
|
|
98
239
|
for (const [peerId, timedOutPeer] of this.timedOutPeers.entries()) {
|
|
99
240
|
if (now >= timedOutPeer.timeoutUntilMs) {
|
|
100
241
|
this.timedOutPeers.delete(peerId);
|
|
@@ -103,16 +244,57 @@ export class PeerManager {
|
|
|
103
244
|
}
|
|
104
245
|
|
|
105
246
|
/**
|
|
106
|
-
*
|
|
247
|
+
* Processes scheduled disconnects during heartbeat.
|
|
248
|
+
*
|
|
249
|
+
* This batch processes all peers that have been marked for disconnect.
|
|
250
|
+
* preventing immediate disconnects that could cause libp2p state corruption.
|
|
251
|
+
*/
|
|
252
|
+
private async processScheduledDisconnects() {
|
|
253
|
+
if (this.peersToBeDisconnected.size === 0) {
|
|
254
|
+
return;
|
|
255
|
+
}
|
|
256
|
+
|
|
257
|
+
const peersToDisconnect = Array.from(this.peersToBeDisconnected);
|
|
258
|
+
|
|
259
|
+
this.logger.debug(`Processing ${peersToDisconnect.length} scheduled disconnects`);
|
|
260
|
+
try {
|
|
261
|
+
await Promise.all(
|
|
262
|
+
peersToDisconnect.map(async peerIdStr => {
|
|
263
|
+
if (await this.disconnectPeer(peerIdFromString(peerIdStr))) {
|
|
264
|
+
this.peersToBeDisconnected.delete(peerIdStr);
|
|
265
|
+
}
|
|
266
|
+
}),
|
|
267
|
+
);
|
|
268
|
+
this.logger.verbose(`Disconnected ${peersToDisconnect.length} peers`, { peersToDisconnect });
|
|
269
|
+
} catch (error) {
|
|
270
|
+
this.logger.error('Error when disconnecting from peers', error);
|
|
271
|
+
}
|
|
272
|
+
}
|
|
273
|
+
|
|
274
|
+
/**
|
|
275
|
+
* Performs Status Handshake with a connected peer.
|
|
107
276
|
* @param e - The connected peer event.
|
|
108
277
|
*/
|
|
109
278
|
private handleConnectedPeerEvent(e: CustomEvent<PeerId>) {
|
|
110
279
|
const peerId = e.detail;
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
280
|
+
this.logger.verbose(`Connected to peer ${peerId.toString()}`);
|
|
281
|
+
if (this.config.p2pDisableStatusHandshake) {
|
|
282
|
+
return;
|
|
283
|
+
}
|
|
284
|
+
// If we are not configured to only allow validators then perform a status handshake
|
|
285
|
+
if (!this.config.p2pAllowOnlyValidators) {
|
|
286
|
+
void this.exchangeStatusHandshake(peerId);
|
|
287
|
+
return;
|
|
288
|
+
}
|
|
289
|
+
|
|
290
|
+
// We are configured to only allow validators, but this doesn't apply to trusted, private peers or preferred peers
|
|
291
|
+
if (this.isProtectedPeer(peerId)) {
|
|
292
|
+
void this.exchangeStatusHandshake(peerId);
|
|
293
|
+
return;
|
|
115
294
|
}
|
|
295
|
+
|
|
296
|
+
// Initiate auth handshake
|
|
297
|
+
void this.exchangeAuthHandshake(peerId);
|
|
116
298
|
}
|
|
117
299
|
|
|
118
300
|
/**
|
|
@@ -121,11 +303,101 @@ export class PeerManager {
|
|
|
121
303
|
*/
|
|
122
304
|
private handleDisconnectedPeerEvent(e: CustomEvent<PeerId>) {
|
|
123
305
|
const peerId = e.detail;
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
this.logger.
|
|
306
|
+
this.logger.verbose(`Disconnected from peer ${peerId.toString()}`);
|
|
307
|
+
const validatorAddress = this.authenticatedPeerIdToValidatorAddress.get(peerId.toString());
|
|
308
|
+
if (validatorAddress !== undefined) {
|
|
309
|
+
this.logger.info(
|
|
310
|
+
`Removing authentication for validator ${validatorAddress} at peer id ${peerId.toString()} due to disconnection`,
|
|
311
|
+
);
|
|
312
|
+
this.authenticatedValidatorAddressToPeerId.delete(validatorAddress.toString());
|
|
313
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peerId.toString());
|
|
314
|
+
}
|
|
315
|
+
}
|
|
316
|
+
|
|
317
|
+
public registerThisValidatorAddresses(address: EthAddress[]): void {
|
|
318
|
+
this.validatorAddresses = [...address];
|
|
319
|
+
}
|
|
320
|
+
|
|
321
|
+
/**
|
|
322
|
+
* Checks if a peer is trusted.
|
|
323
|
+
* @param peerId - The peer ID.
|
|
324
|
+
* @returns True if the peer is trusted, false otherwise.
|
|
325
|
+
* Note: This function will return false and log a warning if the trusted peers are not initialized.
|
|
326
|
+
*/
|
|
327
|
+
private isTrustedPeer(peerId: PeerId): boolean {
|
|
328
|
+
if (!this.trustedPeersInitialized) {
|
|
329
|
+
this.logger.warn('Trusted peers not initialized, returning false');
|
|
330
|
+
return false;
|
|
128
331
|
}
|
|
332
|
+
return this.trustedPeers.has(peerId.toString());
|
|
333
|
+
}
|
|
334
|
+
|
|
335
|
+
/**
|
|
336
|
+
* Adds a peer to the trusted peers set.
|
|
337
|
+
* @param peerId - The peer ID to add to trusted peers.
|
|
338
|
+
*/
|
|
339
|
+
public addTrustedPeer(peerId: PeerId): void {
|
|
340
|
+
const peerIdStr = peerId.toString();
|
|
341
|
+
|
|
342
|
+
this.trustedPeers.add(peerIdStr);
|
|
343
|
+
this.trustedPeersInitialized = true;
|
|
344
|
+
this.logger.verbose(`Added trusted peer ${peerIdStr}`);
|
|
345
|
+
}
|
|
346
|
+
|
|
347
|
+
/**
|
|
348
|
+
* Adds a peer to the private peers set.
|
|
349
|
+
* @param peerId - The peer ID to add to private peers.
|
|
350
|
+
*/
|
|
351
|
+
public addPrivatePeer(peerId: PeerId): void {
|
|
352
|
+
const peerIdStr = peerId.toString();
|
|
353
|
+
|
|
354
|
+
this.trustedPeers.add(peerIdStr);
|
|
355
|
+
this.privatePeers.add(peerIdStr);
|
|
356
|
+
this.trustedPeersInitialized = true;
|
|
357
|
+
this.privatePeersInitialized = true;
|
|
358
|
+
this.logger.verbose(`Added private peer ${peerIdStr}`);
|
|
359
|
+
}
|
|
360
|
+
|
|
361
|
+
/**
|
|
362
|
+
* Checks if a peer is private.
|
|
363
|
+
* @param peerId - The peer ID.
|
|
364
|
+
* @returns True if the peer is private, false otherwise.
|
|
365
|
+
*/
|
|
366
|
+
private isPrivatePeer(peerId: PeerId): boolean {
|
|
367
|
+
if (!this.privatePeersInitialized) {
|
|
368
|
+
this.logger.warn('Private peers not initialized, returning false');
|
|
369
|
+
return false;
|
|
370
|
+
}
|
|
371
|
+
return this.privatePeers.has(peerId.toString());
|
|
372
|
+
}
|
|
373
|
+
|
|
374
|
+
/**
|
|
375
|
+
* Adds a peer to the preferred peers set.
|
|
376
|
+
* @param peerId - The peer ID to add to preferred peers.
|
|
377
|
+
*/
|
|
378
|
+
public addPreferredPeer(peerId: PeerId): void {
|
|
379
|
+
const peerIdStr = peerId.toString();
|
|
380
|
+
|
|
381
|
+
this.preferredPeers.add(peerIdStr);
|
|
382
|
+
this.logger.verbose(`Added preferred peer ${peerIdStr}`);
|
|
383
|
+
}
|
|
384
|
+
|
|
385
|
+
/**
|
|
386
|
+
* Checks if a peer is preferred.
|
|
387
|
+
* @param peerId - The peer ID.
|
|
388
|
+
* @returns True if the peer is preferred, false otherwise.
|
|
389
|
+
*/
|
|
390
|
+
private isPreferredPeer(peerId: PeerId): boolean {
|
|
391
|
+
return this.preferredPeers.has(peerId.toString());
|
|
392
|
+
}
|
|
393
|
+
|
|
394
|
+
/**
|
|
395
|
+
* Checks if a peer is protected (either trusted or private).
|
|
396
|
+
* @param peerId - The peer ID.
|
|
397
|
+
* @returns True if the peer is protected, false otherwise.
|
|
398
|
+
*/
|
|
399
|
+
private isProtectedPeer(peerId: PeerId): boolean {
|
|
400
|
+
return this.isTrustedPeer(peerId) || this.isPrivatePeer(peerId) || this.isPreferredPeer(peerId);
|
|
129
401
|
}
|
|
130
402
|
|
|
131
403
|
/**
|
|
@@ -140,7 +412,7 @@ export class PeerManager {
|
|
|
140
412
|
|
|
141
413
|
this.metrics.recordGoodbyeReceived(reason);
|
|
142
414
|
|
|
143
|
-
|
|
415
|
+
this.markPeerForDisconnect(peerId);
|
|
144
416
|
}
|
|
145
417
|
|
|
146
418
|
public penalizePeer(peerId: PeerId, penalty: PeerErrorSeverity) {
|
|
@@ -151,6 +423,11 @@ export class PeerManager {
|
|
|
151
423
|
return this.peerScoring.getScore(peerId);
|
|
152
424
|
}
|
|
153
425
|
|
|
426
|
+
public shouldDisableP2PGossip(peerId: string): boolean {
|
|
427
|
+
const isAuthenticated = this.isAuthenticatedPeer(peerIdFromString(peerId));
|
|
428
|
+
return (this.config.p2pAllowOnlyValidators ?? false) && !isAuthenticated;
|
|
429
|
+
}
|
|
430
|
+
|
|
154
431
|
public getPeers(includePending = false): PeerInfo[] {
|
|
155
432
|
const connected = this.libP2PNode
|
|
156
433
|
.getPeers()
|
|
@@ -184,25 +461,61 @@ export class PeerManager {
|
|
|
184
461
|
return [...connected, ...dialQueue, ...cachedPeers];
|
|
185
462
|
}
|
|
186
463
|
|
|
464
|
+
public isAuthenticatedPeer(peerId: PeerId): boolean {
|
|
465
|
+
const peerIdAsString = peerId.toString();
|
|
466
|
+
return (
|
|
467
|
+
this.privatePeers.has(peerIdAsString) ||
|
|
468
|
+
this.trustedPeers.has(peerIdAsString) ||
|
|
469
|
+
this.preferredPeers.has(peerIdAsString) ||
|
|
470
|
+
this.authenticatedPeerIdToValidatorAddress.has(peerIdAsString)
|
|
471
|
+
);
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
/*
|
|
475
|
+
* Checks whether peer is allowed to connect
|
|
476
|
+
*
|
|
477
|
+
* @param id: Address of the node or it's peerId
|
|
478
|
+
*
|
|
479
|
+
* @returns: True if node is allowed to connect, otherwise false
|
|
480
|
+
* */
|
|
481
|
+
public isNodeAllowedToConnect(id: string | PeerId): boolean {
|
|
482
|
+
const entry = this.failedAuthHandshakes.get(id.toString());
|
|
483
|
+
if (!entry) {
|
|
484
|
+
return true;
|
|
485
|
+
}
|
|
486
|
+
|
|
487
|
+
// In case entry is too old, remove it and allow connection
|
|
488
|
+
if (this.dateProvider.now() - entry.lastFailureTimestamp > FAILED_AUTH_HANDSHAKE_EXPIRY_MS) {
|
|
489
|
+
this.failedAuthHandshakes.delete(id.toString());
|
|
490
|
+
return true;
|
|
491
|
+
}
|
|
492
|
+
|
|
493
|
+
return entry.count <= this.config.p2pMaxFailedAuthAttemptsAllowed;
|
|
494
|
+
}
|
|
495
|
+
|
|
187
496
|
/**
|
|
188
497
|
* Discovers peers.
|
|
189
498
|
*/
|
|
190
499
|
private discover() {
|
|
191
500
|
const connections = this.libP2PNode.getConnections();
|
|
192
501
|
|
|
193
|
-
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.
|
|
502
|
+
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.getNonProtectedPeers(connections)));
|
|
194
503
|
|
|
195
504
|
// Calculate how many connections we're looking to make
|
|
196
|
-
const
|
|
505
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
506
|
+
const peersToConnect = this.config.maxPeerCount - healthyConnections.length - protectedPeerCount;
|
|
197
507
|
|
|
198
508
|
const logLevel = this.heartbeatCounter % this.displayPeerCountsPeerHeartbeat === 0 ? 'info' : 'debug';
|
|
199
|
-
this.logger[logLevel](`Connected to ${healthyConnections.length} peers`, {
|
|
200
|
-
|
|
509
|
+
this.logger[logLevel](`Connected to ${healthyConnections.length + this.trustedPeers.size} peers`, {
|
|
510
|
+
discoveredConnections: healthyConnections.length,
|
|
511
|
+
protectedConnections: protectedPeerCount,
|
|
201
512
|
maxPeerCount: this.config.maxPeerCount,
|
|
202
513
|
cachedPeers: this.cachedPeers.size,
|
|
203
514
|
...this.peerScoring.getStats(),
|
|
204
515
|
});
|
|
205
516
|
|
|
517
|
+
this.metrics.recordPeerCount(healthyConnections.length);
|
|
518
|
+
|
|
206
519
|
// Exit if no peers to connect
|
|
207
520
|
if (peersToConnect <= 0) {
|
|
208
521
|
return;
|
|
@@ -217,13 +530,14 @@ export class PeerManager {
|
|
|
217
530
|
.filter(Boolean) as string[],
|
|
218
531
|
);
|
|
219
532
|
|
|
533
|
+
const now = this.dateProvider.now();
|
|
220
534
|
for (const [id, peerData] of this.cachedPeers.entries()) {
|
|
221
535
|
// if already dialling or connected to, remove from cache
|
|
222
536
|
if (
|
|
223
537
|
pendingDials.has(id) ||
|
|
224
538
|
healthyConnections.some(conn => conn.remotePeer.equals(peerData.peerId)) ||
|
|
225
539
|
// if peer has been in cache for the max cache age, remove from cache
|
|
226
|
-
|
|
540
|
+
now - peerData.addedUnixMs > MAX_CACHED_PEER_AGE_MS
|
|
227
541
|
) {
|
|
228
542
|
this.cachedPeers.delete(id);
|
|
229
543
|
} else {
|
|
@@ -248,6 +562,14 @@ export class PeerManager {
|
|
|
248
562
|
}
|
|
249
563
|
}
|
|
250
564
|
|
|
565
|
+
private getNonProtectedPeers(connections: Connection[]): Connection[] {
|
|
566
|
+
return connections.filter(conn => !this.isProtectedPeer(conn.remotePeer));
|
|
567
|
+
}
|
|
568
|
+
|
|
569
|
+
private getProtectedPeerCount(): number {
|
|
570
|
+
return this.trustedPeers.size + this.privatePeers.size + this.preferredPeers.size;
|
|
571
|
+
}
|
|
572
|
+
|
|
251
573
|
private pruneUnhealthyPeers(connections: Connection[]): Connection[] {
|
|
252
574
|
const connectedHealthyPeers: Connection[] = [];
|
|
253
575
|
|
|
@@ -275,75 +597,85 @@ export class PeerManager {
|
|
|
275
597
|
* @returns The pruned list of connections.
|
|
276
598
|
*/
|
|
277
599
|
private prioritizePeers(connections: Connection[]): Connection[] {
|
|
278
|
-
|
|
279
|
-
|
|
600
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
601
|
+
if (connections.length > this.config.maxPeerCount - protectedPeerCount) {
|
|
602
|
+
// Sort the regular peer scores from highest to lowest
|
|
280
603
|
const prioritizedConnections = connections.sort((connectionA, connectionB) => {
|
|
281
604
|
const connectionScoreA = this.peerScoring.getScore(connectionA.remotePeer.toString());
|
|
282
605
|
const connectionScoreB = this.peerScoring.getScore(connectionB.remotePeer.toString());
|
|
283
606
|
return connectionScoreB - connectionScoreA;
|
|
284
607
|
});
|
|
285
608
|
|
|
286
|
-
//
|
|
287
|
-
|
|
609
|
+
// Calculate how many regular peers we can keep
|
|
610
|
+
const peersToKeep = Math.max(0, this.config.maxPeerCount - protectedPeerCount);
|
|
611
|
+
|
|
612
|
+
// Disconnect from the lowest scoring regular connections that exceed our limit
|
|
613
|
+
for (const conn of prioritizedConnections.slice(peersToKeep)) {
|
|
288
614
|
void this.goodbyeAndDisconnectPeer(conn.remotePeer, GoodByeReason.MAX_PEERS);
|
|
289
615
|
}
|
|
290
|
-
|
|
616
|
+
|
|
617
|
+
// Return trusted connections plus the highest scoring regular connections up to the max peer count
|
|
618
|
+
return prioritizedConnections.slice(0, peersToKeep);
|
|
291
619
|
} else {
|
|
292
620
|
return connections;
|
|
293
621
|
}
|
|
294
622
|
}
|
|
295
623
|
|
|
296
|
-
/**
|
|
297
|
-
* If multiple connections to the same peer are found, the oldest connection is kept and the duplicates are pruned.
|
|
298
|
-
*
|
|
299
|
-
* This is necessary to resolve a race condition where multiple connections to the same peer are established if
|
|
300
|
-
* they are discovered at the same time.
|
|
301
|
-
*
|
|
302
|
-
* @param connections - The list of connections to prune duplicate peers from.
|
|
303
|
-
* @returns The pruned list of connections.
|
|
304
|
-
*/
|
|
305
|
-
private pruneDuplicatePeers(connections: Connection[]): Connection[] {
|
|
306
|
-
const peerConnections = new Map<string, Connection>();
|
|
307
|
-
|
|
308
|
-
for (const conn of connections) {
|
|
309
|
-
const peerId = conn.remotePeer.toString();
|
|
310
|
-
const existingConnection = peerConnections.get(peerId);
|
|
311
|
-
if (!existingConnection) {
|
|
312
|
-
peerConnections.set(peerId, conn);
|
|
313
|
-
} else {
|
|
314
|
-
// Keep the oldest connection for each peer
|
|
315
|
-
this.logger.debug(`Found duplicate connection to peer ${peerId}, keeping oldest connection`);
|
|
316
|
-
if (conn.timeline.open < existingConnection.timeline.open) {
|
|
317
|
-
peerConnections.set(peerId, conn);
|
|
318
|
-
void existingConnection.close();
|
|
319
|
-
} else {
|
|
320
|
-
void conn.close();
|
|
321
|
-
}
|
|
322
|
-
}
|
|
323
|
-
}
|
|
324
|
-
|
|
325
|
-
return [...peerConnections.values()];
|
|
326
|
-
}
|
|
327
|
-
|
|
328
624
|
private async goodbyeAndDisconnectPeer(peer: PeerId, reason: GoodByeReason) {
|
|
329
625
|
this.logger.debug(`Disconnecting peer ${peer.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
330
626
|
|
|
331
627
|
this.metrics.recordGoodbyeSent(reason);
|
|
332
628
|
|
|
333
629
|
try {
|
|
334
|
-
await this.reqresp.sendRequestToPeer(
|
|
630
|
+
const resp = await this.reqresp.sendRequestToPeer(
|
|
631
|
+
peer,
|
|
632
|
+
ReqRespSubProtocol.GOODBYE,
|
|
633
|
+
Buffer.from([reason]),
|
|
634
|
+
GOODBYE_DIAL_TIMEOUT_MS,
|
|
635
|
+
);
|
|
636
|
+
|
|
637
|
+
if (resp.status === ReqRespStatus.FAILURE) {
|
|
638
|
+
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}`);
|
|
639
|
+
} else if (resp.status === ReqRespStatus.SUCCESS) {
|
|
640
|
+
this.logger.verbose(`Sent goodbye to peer ${peer.toString()}`);
|
|
641
|
+
} else {
|
|
642
|
+
this.logger.debug(
|
|
643
|
+
`Unexpected status sending goodbye to peer ${peer.toString()}: ${ReqRespStatus[resp.status]}`,
|
|
644
|
+
);
|
|
645
|
+
}
|
|
335
646
|
} catch (error) {
|
|
336
647
|
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}: ${error}`);
|
|
337
648
|
} finally {
|
|
338
|
-
|
|
649
|
+
this.markPeerForDisconnect(peer);
|
|
339
650
|
}
|
|
340
651
|
}
|
|
341
652
|
|
|
342
|
-
|
|
653
|
+
/*
|
|
654
|
+
* Marks peer to be disconnected on the next heartbeat
|
|
655
|
+
* */
|
|
656
|
+
private markPeerForDisconnect(peer: PeerId) {
|
|
657
|
+
const peerIdStr = peer.toString();
|
|
658
|
+
this.logger.debug(`Scheduling peer ${peerIdStr} for disconnection`);
|
|
659
|
+
this.peersToBeDisconnected.add(peerIdStr);
|
|
660
|
+
}
|
|
661
|
+
|
|
662
|
+
/**
|
|
663
|
+
* Performs the actual disconnection of a peer.
|
|
664
|
+
* This is called during heartbeat processing to avoid immediate disconnections.
|
|
665
|
+
*
|
|
666
|
+
* @returns True if peer was disconnect, otherwise false
|
|
667
|
+
*/
|
|
668
|
+
private async disconnectPeer(peer: PeerId): Promise<boolean> {
|
|
669
|
+
const peerIdStr = peer.toString();
|
|
670
|
+
|
|
343
671
|
try {
|
|
344
672
|
await this.libP2PNode.hangUp(peer);
|
|
673
|
+
|
|
674
|
+
this.logger.debug(`Successfully disconnected peer ${peerIdStr}`);
|
|
675
|
+
return true;
|
|
345
676
|
} catch (error) {
|
|
346
|
-
this.logger.
|
|
677
|
+
this.logger.warn(`Failed to disconnect peer ${peerIdStr}`, { error });
|
|
678
|
+
return false;
|
|
347
679
|
}
|
|
348
680
|
}
|
|
349
681
|
|
|
@@ -356,10 +688,16 @@ export class PeerManager {
|
|
|
356
688
|
const peerId = await enr.peerId();
|
|
357
689
|
const peerIdString = peerId.toString();
|
|
358
690
|
|
|
691
|
+
// Don't attempt to connect to peers scheduled for disconnection
|
|
692
|
+
if (this.peersToBeDisconnected.has(peerIdString)) {
|
|
693
|
+
this.logger.trace(`Skipping peer scheduled for disconnection ${peerId}`);
|
|
694
|
+
return;
|
|
695
|
+
}
|
|
696
|
+
|
|
359
697
|
// Check if peer is temporarily timed out
|
|
360
698
|
const timedOutPeer = this.timedOutPeers.get(peerIdString);
|
|
361
699
|
if (timedOutPeer) {
|
|
362
|
-
if (
|
|
700
|
+
if (this.dateProvider.now() < timedOutPeer.timeoutUntilMs) {
|
|
363
701
|
this.logger.trace(`Skipping timed out peer ${peerId}`);
|
|
364
702
|
return;
|
|
365
703
|
}
|
|
@@ -399,7 +737,7 @@ export class PeerManager {
|
|
|
399
737
|
enr,
|
|
400
738
|
multiaddrTcp,
|
|
401
739
|
dialAttempts: 0,
|
|
402
|
-
addedUnixMs:
|
|
740
|
+
addedUnixMs: this.dateProvider.now(),
|
|
403
741
|
};
|
|
404
742
|
|
|
405
743
|
// Determine if we should dial immediately or not
|
|
@@ -434,7 +772,7 @@ export class PeerManager {
|
|
|
434
772
|
// Add to timed out peers
|
|
435
773
|
this.timedOutPeers.set(id, {
|
|
436
774
|
peerId: id,
|
|
437
|
-
timeoutUntilMs:
|
|
775
|
+
timeoutUntilMs: this.dateProvider.now() + FAILED_PEER_BAN_TIME_MS,
|
|
438
776
|
});
|
|
439
777
|
}
|
|
440
778
|
}
|
|
@@ -458,7 +796,12 @@ export class PeerManager {
|
|
|
458
796
|
}
|
|
459
797
|
|
|
460
798
|
// Remove the oldest peers
|
|
461
|
-
for (const key of this.cachedPeers.
|
|
799
|
+
for (const [key, value] of this.cachedPeers.entries()) {
|
|
800
|
+
if (this.isProtectedPeer(value.peerId)) {
|
|
801
|
+
this.logger.debug(`Not pruning trusted peer ${key}`);
|
|
802
|
+
continue;
|
|
803
|
+
}
|
|
804
|
+
|
|
462
805
|
this.cachedPeers.delete(key);
|
|
463
806
|
this.logger.trace(`Pruning peer ${key} from cache`);
|
|
464
807
|
peersToDelete--;
|
|
@@ -468,21 +811,252 @@ export class PeerManager {
|
|
|
468
811
|
}
|
|
469
812
|
}
|
|
470
813
|
|
|
814
|
+
private async createStatusMessage() {
|
|
815
|
+
const syncSummary = (await this.worldStateSynchronizer.status()).syncSummary;
|
|
816
|
+
return StatusMessage.fromWorldStateSyncStatus(this.protocolVersion, syncSummary);
|
|
817
|
+
}
|
|
818
|
+
|
|
819
|
+
/**
|
|
820
|
+
* Performs status Handshake with the Peer
|
|
821
|
+
* The way the protocol is designed is that each peer will call this method on newly established p2p connection.
|
|
822
|
+
* Both peers request Status message and both peers perform validation of the received Status message.
|
|
823
|
+
* If this validation fails on any end that peer will initiate disconnect.
|
|
824
|
+
* Note: It's important for both peers to request and perform Status validation,
|
|
825
|
+
* Because one of the peers can be _bad peer_ and this peer can simply skip the check.
|
|
826
|
+
* If we don't implement validation on both ends the _bad peer_ remains connected.
|
|
827
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
828
|
+
* */
|
|
829
|
+
private async exchangeStatusHandshake(peerId: PeerId) {
|
|
830
|
+
try {
|
|
831
|
+
const ourStatus = await this.createStatusMessage();
|
|
832
|
+
//Note: Technically we don't have to send out status to peer as well, but we do.
|
|
833
|
+
//It will be easier to update protocol in the future this way if need be.
|
|
834
|
+
this.logger.trace(`Initiating status handshake with peer ${peerId}`);
|
|
835
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.STATUS, ourStatus.toBuffer());
|
|
836
|
+
const { status } = response;
|
|
837
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
838
|
+
//TODO: maybe hard ban these peers in the future.
|
|
839
|
+
//We could allow this to happen up to N times, and then hard ban?
|
|
840
|
+
//Hard ban: Disallow connection via e.g. libp2p's Gater
|
|
841
|
+
this.logger.debug(`Disconnecting peer ${peerId} who failed to respond status handshake`, {
|
|
842
|
+
peerId,
|
|
843
|
+
status: ReqRespStatus[status],
|
|
844
|
+
});
|
|
845
|
+
this.markPeerForDisconnect(peerId);
|
|
846
|
+
return;
|
|
847
|
+
}
|
|
848
|
+
|
|
849
|
+
const { data } = response;
|
|
850
|
+
const logData = { peerId, status: ReqRespStatus[status], data: data ? bufferToHex(data) : undefined };
|
|
851
|
+
const peerStatusMessage = StatusMessage.fromBuffer(data);
|
|
852
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
853
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to failed status handshake.`, logData);
|
|
854
|
+
this.markPeerForDisconnect(peerId);
|
|
855
|
+
return;
|
|
856
|
+
}
|
|
857
|
+
this.logger.debug(`Successfully completed status handshake with peer ${peerId}`, logData);
|
|
858
|
+
} catch (err: any) {
|
|
859
|
+
//TODO: maybe hard ban these peers in the future
|
|
860
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to error during status handshake: ${err.message ?? err}`, {
|
|
861
|
+
peerId,
|
|
862
|
+
});
|
|
863
|
+
this.markPeerForDisconnect(peerId);
|
|
864
|
+
}
|
|
865
|
+
}
|
|
866
|
+
|
|
867
|
+
/**
|
|
868
|
+
* Performs auth Handshake with the Peer
|
|
869
|
+
* A superset of the status handshake. Also includes a challenge that needs to be signed by the peer's validator key.
|
|
870
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
871
|
+
* */
|
|
872
|
+
private async exchangeAuthHandshake(peerId: PeerId) {
|
|
873
|
+
const peerIdString = peerId.toString();
|
|
874
|
+
|
|
875
|
+
try {
|
|
876
|
+
const ourStatus = await this.createStatusMessage();
|
|
877
|
+
const authRequest = new AuthRequest(ourStatus, Fr.random());
|
|
878
|
+
|
|
879
|
+
// Note: Technically we don't have to send our status to peer as well, but we do.
|
|
880
|
+
// It will be easier to update protocol in the future this way if need be.
|
|
881
|
+
// We also need to send the challenge at least, so that the peer can sign it.
|
|
882
|
+
this.logger.debug(`Initiating auth handshake with peer ${peerId}`);
|
|
883
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.AUTH, authRequest.toBuffer());
|
|
884
|
+
const { status } = response;
|
|
885
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
886
|
+
this.logger.verbose(`Disconnecting peer ${peerId} who failed to respond auth handshake`, {
|
|
887
|
+
peerId,
|
|
888
|
+
status: ReqRespStatus[status],
|
|
889
|
+
});
|
|
890
|
+
this.markAuthHandshakeFailed(peerId);
|
|
891
|
+
this.markPeerForDisconnect(peerId);
|
|
892
|
+
return;
|
|
893
|
+
}
|
|
894
|
+
|
|
895
|
+
const { data } = response;
|
|
896
|
+
const logData = { peerId, status: ReqRespStatus[status], data: data ? bufferToHex(data) : undefined };
|
|
897
|
+
|
|
898
|
+
const peerAuthResponse = AuthResponse.fromBuffer(data);
|
|
899
|
+
|
|
900
|
+
const peerStatusMessage = peerAuthResponse.status;
|
|
901
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
902
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed status handshake as part of auth.`, logData);
|
|
903
|
+
this.markAuthHandshakeFailed(peerId);
|
|
904
|
+
this.markPeerForDisconnect(peerId);
|
|
905
|
+
return;
|
|
906
|
+
}
|
|
907
|
+
|
|
908
|
+
const hashToRecover = authRequest.getPayloadToSign();
|
|
909
|
+
const ethSignedHash = makeEthSignDigest(hashToRecover);
|
|
910
|
+
const sender = tryRecoverAddress(ethSignedHash, peerAuthResponse.signature);
|
|
911
|
+
if (!sender) {
|
|
912
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, invalid signature.`, logData);
|
|
913
|
+
this.markAuthHandshakeFailed(peerId);
|
|
914
|
+
this.markPeerForDisconnect(peerId);
|
|
915
|
+
return;
|
|
916
|
+
}
|
|
917
|
+
|
|
918
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
919
|
+
const found = registeredValidators.find(v => v.toString() === sender.toString()) !== undefined;
|
|
920
|
+
if (!found) {
|
|
921
|
+
this.logger.verbose(
|
|
922
|
+
`Disconnecting peer ${peerId} due to failed auth handshake, peer is not a registered validator.`,
|
|
923
|
+
{ ...logData, address: sender.toString() },
|
|
924
|
+
);
|
|
925
|
+
this.markAuthHandshakeFailed(peerId);
|
|
926
|
+
this.markPeerForDisconnect(peerId);
|
|
927
|
+
return;
|
|
928
|
+
}
|
|
929
|
+
|
|
930
|
+
// Check to see that this validator address isn't already allocated to a different peer
|
|
931
|
+
const peerForAddress = this.authenticatedValidatorAddressToPeerId.get(sender.toString());
|
|
932
|
+
if (peerForAddress !== undefined && peerForAddress.toString() !== peerIdString) {
|
|
933
|
+
this.logger.verbose(
|
|
934
|
+
`Received auth for validator ${sender.toString()} from peer ${peerIdString}, but this validator is already authenticated to peer ${peerForAddress.toString()}`,
|
|
935
|
+
{ ...logData, address: sender.toString() },
|
|
936
|
+
);
|
|
937
|
+
return;
|
|
938
|
+
}
|
|
939
|
+
|
|
940
|
+
this.markAuthHandshakeSuccess(peerId);
|
|
941
|
+
this.authenticatedPeerIdToValidatorAddress.set(peerIdString, sender);
|
|
942
|
+
this.authenticatedValidatorAddressToPeerId.set(sender.toString(), peerId);
|
|
943
|
+
this.logger.info(
|
|
944
|
+
`Successfully completed auth handshake with peer ${peerId}, validator address ${sender.toString()}`,
|
|
945
|
+
{ ...logData, address: sender.toString() },
|
|
946
|
+
);
|
|
947
|
+
} catch (err: any) {
|
|
948
|
+
//TODO: maybe hard ban these peers in the future
|
|
949
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to error during auth handshake: ${err.message}`, {
|
|
950
|
+
peerId,
|
|
951
|
+
err,
|
|
952
|
+
});
|
|
953
|
+
this.markAuthHandshakeFailed(peerId);
|
|
954
|
+
this.markPeerForDisconnect(peerId);
|
|
955
|
+
}
|
|
956
|
+
}
|
|
957
|
+
|
|
958
|
+
/*
|
|
959
|
+
* Marks when peer fails auth handshake
|
|
960
|
+
* */
|
|
961
|
+
private markAuthHandshakeFailed(peerId: PeerId) {
|
|
962
|
+
const now = this.dateProvider.now();
|
|
963
|
+
const peerIdStr = peerId.toString();
|
|
964
|
+
|
|
965
|
+
const existingEntry = this.failedAuthHandshakes.get(peerIdStr);
|
|
966
|
+
this.failedAuthHandshakes.set(peerIdStr, {
|
|
967
|
+
count: (existingEntry?.count || 0) + 1,
|
|
968
|
+
lastFailureTimestamp: now,
|
|
969
|
+
});
|
|
970
|
+
|
|
971
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
972
|
+
connections.forEach(conn => {
|
|
973
|
+
// We mark the IP address
|
|
974
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
975
|
+
const existingAddressEntry = this.failedAuthHandshakes.get(address);
|
|
976
|
+
this.failedAuthHandshakes.set(address, {
|
|
977
|
+
count: (existingAddressEntry?.count || 0) + 1,
|
|
978
|
+
lastFailureTimestamp: now,
|
|
979
|
+
});
|
|
980
|
+
});
|
|
981
|
+
}
|
|
982
|
+
|
|
983
|
+
/*
|
|
984
|
+
* Marks when peer exchanges auth handshake
|
|
985
|
+
* Removes any failed previous attempts
|
|
986
|
+
* */
|
|
987
|
+
private markAuthHandshakeSuccess(peerId: PeerId) {
|
|
988
|
+
this.failedAuthHandshakes.delete(peerId.toString());
|
|
989
|
+
|
|
990
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
991
|
+
connections.forEach(conn => {
|
|
992
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
993
|
+
this.failedAuthHandshakes.delete(address);
|
|
994
|
+
});
|
|
995
|
+
}
|
|
996
|
+
|
|
471
997
|
/**
|
|
472
998
|
* Stops the peer manager.
|
|
473
999
|
* Removing all event listeners.
|
|
474
1000
|
*/
|
|
475
1001
|
public async stop() {
|
|
476
1002
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
477
|
-
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.
|
|
1003
|
+
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
478
1004
|
|
|
479
1005
|
// Send goodbyes to all peers
|
|
480
1006
|
await Promise.all(
|
|
481
1007
|
this.libP2PNode.getPeers().map(peer => this.goodbyeAndDisconnectPeer(peer, GoodByeReason.SHUTDOWN)),
|
|
482
1008
|
);
|
|
483
1009
|
|
|
484
|
-
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent);
|
|
485
|
-
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent);
|
|
1010
|
+
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
1011
|
+
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
1012
|
+
}
|
|
1013
|
+
|
|
1014
|
+
private shouldTrustWithIdentity(peerId: PeerId): boolean {
|
|
1015
|
+
return this.isProtectedPeer(peerId);
|
|
1016
|
+
}
|
|
1017
|
+
|
|
1018
|
+
/**
|
|
1019
|
+
* Performs auth request verification from peer. An auth request is valid if requested by an authorized peer (a peer we trust).
|
|
1020
|
+
*
|
|
1021
|
+
* @param: _authRequest - Auth request (unused)
|
|
1022
|
+
* @param: peerId - The ID of the peer that requested the auth handshake
|
|
1023
|
+
*
|
|
1024
|
+
* @returns: StatusMessage if peer is trusted
|
|
1025
|
+
*
|
|
1026
|
+
* @throws: If peer is unauthorized
|
|
1027
|
+
* */
|
|
1028
|
+
public async handleAuthRequestFromPeer(_authRequest: AuthRequest, peerId: PeerId): Promise<StatusMessage> {
|
|
1029
|
+
if (!this.shouldTrustWithIdentity(peerId)) {
|
|
1030
|
+
this.logger.warn(`Received auth request from untrusted peer ${peerId.toString()}`);
|
|
1031
|
+
throw new Error('Unauthorised');
|
|
1032
|
+
}
|
|
1033
|
+
this.logger.debug(`Received auth request from trusted peer ${peerId.toString()}`);
|
|
1034
|
+
return await this.createStatusMessage();
|
|
1035
|
+
}
|
|
1036
|
+
|
|
1037
|
+
private async updateAuthenticatedPeers(): Promise<void> {
|
|
1038
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
1039
|
+
const validatorSet = new Set(registeredValidators.map(v => v.toString()));
|
|
1040
|
+
|
|
1041
|
+
const peersToDelete: Set<string> = new Set();
|
|
1042
|
+
const addressesToDelete: Set<string> = new Set();
|
|
1043
|
+
for (const [peer, address] of this.authenticatedPeerIdToValidatorAddress.entries()) {
|
|
1044
|
+
const addressString = address.toString();
|
|
1045
|
+
if (!validatorSet.has(addressString)) {
|
|
1046
|
+
peersToDelete.add(peer);
|
|
1047
|
+
addressesToDelete.add(addressString);
|
|
1048
|
+
this.logger.info(
|
|
1049
|
+
`Removing authentication for peer ${peer.toString()} at address ${addressString} due to no longer being a registered validator`,
|
|
1050
|
+
);
|
|
1051
|
+
}
|
|
1052
|
+
}
|
|
1053
|
+
|
|
1054
|
+
for (const peer of peersToDelete) {
|
|
1055
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peer);
|
|
1056
|
+
}
|
|
1057
|
+
for (const address of addressesToDelete) {
|
|
1058
|
+
this.authenticatedValidatorAddressToPeerId.delete(address);
|
|
1059
|
+
}
|
|
486
1060
|
}
|
|
487
1061
|
}
|
|
488
1062
|
|